Mainframes are able to work with and process data using many different operating systems, applications, and protocols. They are also able to save that data onto many different kinds of storage media. What follows is a brief overview of some of the most common types of mainframe storage media. Tape Storage One of the earliest […]

- Access Management
- Business
- Cryptography
- Data Security
- Insider Program
- Main Issue
- Mainframes
- Press Releases
- September 2019
- June 2019
- January 2017
- October 2016
- June 2016
- December 2015
- November 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013

With the number of high-profile data breaches in the news this year, following the breaches of 2013, it would be easy to conclude that these sorts of incidents are an inevitable part of dealing with data. The news stories of data breaches are certainly coming out frequently enough for one to think that public data […]
Selecting what data sets each user or group of users has access to greatly impacts your data security. Selecting appropriate user permissions is a necessary balancing act between security and utility. You must find the appropriate balance between limiting the risk of data being lost, stolen, misused, or damaged on the one side and making […]
Understanding the different states digital data can be in can help you select the kinds of security measures and encryption that are appropriate for protecting it. There are three basic states of data: data at rest, data in motion, and data in use. Below you will find brief descriptions of the three states of data […]