Mainframes Make the Extraordinary Possible
Published on March 3, 2014
No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for…
What Will Matter in Access Management Software in 2014
Published on February 20, 2014
Mobile and cloud computing will continue to increase the importance of a secure access management system. This means access control will have to become an even larger part of any organization's data security strategy. Companies with deep technical talent may be tempted to develop and…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
2013 Was a Year of Big Data Breaches
Published on January 20, 2014
There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…
No News Is Bad News
Published on October 7, 2013
Technology executives run the risk of believing that no news is good news Since IT and mainframe managers are so used to SMS and email alerts warning them of system malfunctions, it becomes harder to seek out and solve the problems that are not glaringly…
Big Data Protection: Six Elements You Must Have
Published on September 25, 2013
Big Data can be a high-stakes game. Here's how to minimize your chances of losing. The revelations of the reach of the NSA's PRISM program revealed to the world just how critical privacy, security, and encryption are. Many users discovered that data and communication which…
Interviewing Mainframe Candidates: Asking the Right Questions
Published on September 17, 2013
Our last post looked at finding the next generation of mainframe talent for your organization. Here's what to ask before you hire them. Recruiting talented individuals to work on mainframes is an ongoing challenge for many organizations. With an aging workforce, few educational programs training…
Recruiting mainframe talent
Published on September 4, 2013
Mainframes aren't going away. Here are some thoughts on how to find and help the next generation of mainframe talent in your company. Mainframes aren't going anywhere. They will continue to serve as the technological backbone of large organizations for years to come. However, there…
Establishing a culture of security
Published on August 29, 2013
Great software is vital. But so is empowering your enterprise to use it. There are many types of software and various services that organizations can purchase to secure their systems, including encryption software, biometrics, access controls, and more. A company can also utilize training seminars,…