Password Reset Security Risks
Published on December 3, 2013
For most software and online service accounts, passwords are the main line of defense. However, it is common for many users to have dozens of user accounts for different apps and services. Security requirements dictate that each password have sufficient complexity and be updated periodically.…
From the Mainframe to the Cloud
Published on November 25, 2013
Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…
Renewing Your Company’s Commitment to Security
Published on November 4, 2013
At one point, your company may have made the decision to take security more seriously. It might have been a strategic initiative, or it might have been in response to a past security breach. The CEO might have addressed the company or sent out a…
Making sense of security
Published on October 29, 2013
You and your team may understand the importance of encryption and data security, but that doesn't mean the people who write the checks get it yet. As a mainframe security professional, part of your job is making sense of the challenges of keeping the data…
BYOD in enterprises running mainframes
Published on October 15, 2013
BYOD (Bring Your Own Device) is the increasingly popular and common practice of employees bringing their personal devices to use at work. Many people who own laptops and smart phones are more proficient at using their own devices than their work-issued hardware. People tend to…
No News Is Bad News
Published on October 7, 2013
Technology executives run the risk of believing that no news is good news Since IT and mainframe managers are so used to SMS and email alerts warning them of system malfunctions, it becomes harder to seek out and solve the problems that are not glaringly…
Big Data Protection: Six Elements You Must Have
Published on September 25, 2013
Big Data can be a high-stakes game. Here's how to minimize your chances of losing. The revelations of the reach of the NSA's PRISM program revealed to the world just how critical privacy, security, and encryption are. Many users discovered that data and communication which…
Interviewing Mainframe Candidates: Asking the Right Questions
Published on September 17, 2013
Our last post looked at finding the next generation of mainframe talent for your organization. Here's what to ask before you hire them. Recruiting talented individuals to work on mainframes is an ongoing challenge for many organizations. With an aging workforce, few educational programs training…
Recruiting mainframe talent
Published on September 4, 2013
Mainframes aren't going away. Here are some thoughts on how to find and help the next generation of mainframe talent in your company. Mainframes aren't going anywhere. They will continue to serve as the technological backbone of large organizations for years to come. However, there…
Mainframe Performance Reporting: Seeing Into Your System
Published on August 23, 2013
Big Data requires an even bigger understanding of how your mainframe is performing. Here's how to pull back the curtain. Managing the large amounts of data produced each business day is a difficult challenge. However, with the rate of data generated growing at a rapid…