Anxiety is high around the potential for Russian cyberattacks given the current political climate...
Author - Christopher Perry
BMC Hackathon Identifies Authorized State Vulnerabilities
Part of BMC’s culture is the fostering of ideas from our field and research and development...
Embracing SecOps with a BMC Helix and BMC AMI Security...
As BMC continues its journey to supporting our clients in achieving their dreams of an autonomous...
Better together: Application Audit and AMI Security
One of BMC Software’s most exciting announcements this year was the acquisition of Compuware,[1]...
Top 8 Ways Hackers Will Exfiltrate Data From Your Mainframe
In previous blogs I have already illustrated the various ways hackers will gain initial access to...
Leveraging Automation to Bridge the Cybersecurity Skills Gap and...
The skyrocketing number of cyberattacks deserves the media attention it garners. 2018 saw a 350%...
Cybersecurity Incident Response on the Mainframe
Endpoint Detection and Response (EDR) solutions have become a necessary component of each...
3 Steps to Shore Up Your Mainframe Security with Endpoint...
For decades, mainframes were practically locked away like vaults, and it was easy to take their...
The Mainframe Security Intelligence Gap
If you have a mainframe, it is nearly guaranteed that you are a professional organization who...
Changing Consumer Conceptions of PII Data Necessitate Event...
Europe’s Data Protection Directive emerged in 1995, just two years after the formation of the...