Protecting the Mainframe from Internal Security Threats
Published on April 22, 2014
Sometimes the threats we face aren't in the Cloud -- they're in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization's data against external threats. Hackers and other cyber criminals pose a risk…
McAfee Names Advanced Software Products Group as Security Innovation Alliance Partner
Published on March 28, 2014
McAfee recognizes self-service password reset and synchronization as a key technology area -- and ASPG as a leading player in the field. The Security Innovation Alliance (SIA) is the premier technology partnership body in the security industry, formed under the aegis of McAfee. The primary…
The Hidden Costs of Moving from the Mainframe
Published on March 20, 2014
Distributed computing came with the promise of many opportunities for cost savings. Companies expected to save money when they move their applications from a centralized mainframe to a distributed environment or cloud solution. However, it's not all sunshine and roses. Many hidden costs inflate the…
Employees and BYOD Security
Published on March 14, 2014
If your organization has a BYOD (Bring Your Own Device) policy, there's a couple more things you'll need: Education for your employees and security on the software side. We've spoken before about some of the technological and policy issues of BYOD for enterprises running mainframes.…
Mainframes Make the Extraordinary Possible
Published on March 3, 2014
No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for…
What Will Matter in Access Management Software in 2014
Published on February 20, 2014
Mobile and cloud computing will continue to increase the importance of a secure access management system. This means access control will have to become an even larger part of any organization's data security strategy. Companies with deep technical talent may be tempted to develop and…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
2013 Was a Year of Big Data Breaches
Published on January 20, 2014
There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…
No News Is Bad News
Published on October 7, 2013
Technology executives run the risk of believing that no news is good news Since IT and mainframe managers are so used to SMS and email alerts warning them of system malfunctions, it becomes harder to seek out and solve the problems that are not glaringly…