Blog

Imagine that you are asked to submit to an external audit of your mainframe environment tomorrow. Would the independent auditor come away with no or only minor adverse findings? That’s the goal. And one way to meet that goal is through internal auditing. Benefits of Internal Audits Conducting internal audits is a proactive practice that…

Read more

Hi everyone, Emergency workers have to be prepared to spring into action at any time—and these days, so do IT professionals. Just like fires, falls and crashes can be unpredictable, so can the next big data breach. The companies you hear about in the news likely thought they were safe from a crippling attack…until they…

Read more

Hi everyone, We’re all familiar with the year-end list—Best Albums of the Year, Top 10 Novels, etc. There’s one list no company or government agency wants to see themselves on: the Top 10 Data Breaches of 2015. This year T-Mobile, VTech, OPM (yours truly received a nice note from them explaining the breach and offering…

Read more

Hi everyone, There’s a lot of information out there—some of it false, or at best incomplete—about mainframe security. As hackers get smarter and attacks become increasingly harder to identify in time, there’s a lot of panic and paranoia out there. Let’s take a collective deep breath, realizing that there are great security tools being developed…

Read more

Hi everyone, We know about the major data breaches at big companies like J.P. Morgan and AT&T because they’re all over our news feeds. But right now, in a small office somewhere in this country, a small business owner is also feeling the pain of a data breach. And small- to medium-sized businesses (SMBs) can…

Read more

Hi everyone, If you watch the news every day, it’s only natural to start developing an irrational fear of “stranger danger”—whether it’s the fear that an unknown intruder is going to raid your house or steal your identity, or that anonymous foreign hackers are going to hack your company’s mainframe. But the truth is you…

Read more

Hi Everyone. This time around I’d like to talk about the lack of proactive IT security measures to identify and stop a breach before it hits the sensitive mainframe data. So many organizations are still placing most if not all of their data security funding and attention into only the distributed systems. The trouble with…

Read more

Hi everyone, I love reading stories of cybercriminals who’ve been apprehended; maybe it’s because as someone who is steeped in data security all day I’ve heard too many stories of companies crippled or even destroyed by a breach. Unfortunately, in the world of cybersecurity, as in life, justice is not always served. But when it…

Read more