Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

By adopting a multifactor authentication (MFA) solution for mainframe security, organizations can protect their most sensitive assets from cybercriminals looking to exploit stolen credentials.

The post Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security appeared first on Security Intelligence.

Continue reading Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

The increasing sophistication of the threat landscape is influencing organizations to adopt multifactor authentication to protect data on all kinds of systems, from mobile phones to mainframes.

The post It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security appeared first on Security Intelligence.

Continue reading It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

With so much data being moved to the cloud, it’s more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks.

The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 appeared first on Security Intelligence.

Continue reading Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

The Interesting Fate Of Kenya’s First Computers

If you are an enthusiast for 1950s computer hardware, you are probably out of luck when it comes to owning a machine of your own. Your best chance will be to join the staff of one of the various museums that preserve and operate these machines, at which you can indulge your passion to your heart’s content. But what if we told you that there is a 1950s computer available for pick-up at any time, to whoever is prepared to go and get it and has suitable transport? You’d be making plans straight away, wouldn’t you? The computer in question …read more

Continue reading The Interesting Fate Of Kenya’s First Computers

Identity Protection: The First Defense Against a Data Breach

Upcoming cybersecurity regulations mandate stricter access controls, but strong identity protection requires a multifactor authentication solution that does more than simply check compliance boxes.

The post Identity Protection: The First Defense Against a Data Breach appeared first on Security Intelligence.

Continue reading Identity Protection: The First Defense Against a Data Breach

IBM 1401 Runs FORTRAN II Once More

The IBM 1401 is undeniably a classic computer. One of IBM’s most “affordable” mainframes, it ruled the small business computing world of the 1960’s. Unfortunately, computers aren’t often thought of as treasured heirlooms, only a handful of these machines survive today. The computer history museum has two machines. One from Germany, and the other recovered from a basement in Connecticut back in 2008. [CuriousMarc] and the rest of the team at the museum have been working diligently to restore the 1401, and they’ve hit quite a milestone — They can now compile and run FORTRAN II code.

Getting the 1401 …read more

Continue reading IBM 1401 Runs FORTRAN II Once More

The Power and Versatility of Pervasive Encryption

Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.

The post The Power and Versatility of Pervasive Encryption appeared first on Security Intelligence.

Continue reading The Power and Versatility of Pervasive Encryption

Pervasive Encryption Simplifies Mainframe Security

With the new pervasive encryption feature in the IBM z14 mainframe server, customers can protect data without changing or adjusting applications.

The post Pervasive Encryption Simplifies Mainframe Security appeared first on Security Intelligence.

Continue reading Pervasive Encryption Simplifies Mainframe Security

Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection

IBM z14 includes all the data protection tools security teams need to safeguard and continuously monitor enterprise data — the organization’s secret sauce.

The post Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection appeared first on Security Intelligence.

Continue reading Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection