Penetration testing (pentesting) is in essence an ethical hack of a system, also known as an...
Author - David Lea
What Does NIST Cybersecurity Framework v2.0 Mean for the...
On February 26, 2024, the U.S. National Institute of Standards and Technology (NIST) finalized the...
What You Need To Know About Following Cybersecurity Frameworks
Do you trust what you’re eating? I can rest easy; in the U.S., I have the Food and Drug...
Protecting PII on the Mainframe
Let’s kick this off by taking a step back and asking the question, “Why implement cybersecurity?”...
Integrating the Mainframe With Your ITSM and SOC
Bridging the gap between “legacy” (I prefer the term “time-honored,”which gives the mainframe the...
Why Privileged Access Management Is a Must-Have for Mainframe...
The mainframe has been around a while. Mainframe security came a little later, but to put it into...
How to Start the Mainframe Security Hardening Process
What is security hardening? Security hardening is the business process of reducing vulnerability to...
New Australia Data Breach Rules Raise the Stakes for Mainframe...
The cost of weak mainframe security just got a lot steeper. Following a series of high-profile...
Bringing the Mainframe into Enterprise-Wide Zero Trust Security
The days of siloed mainframe security—or a lack thereof—are over. Once upon a time, assumptions...