One of BMC Software’s most exciting announcements this year was the acquisition of Compuware,[1]...
Author - Christopher Perry
Top 8 Ways Hackers Will Exfiltrate Data From Your Mainframe
In previous blogs I have already illustrated the various ways hackers will gain initial access to...
Leveraging Automation to Bridge the Cybersecurity Skills Gap and...
The skyrocketing number of cyberattacks deserves the media attention it garners. 2018 saw a 350%...
Cybersecurity Incident Response on the Mainframe
Endpoint Detection and Response (EDR) solutions have become a necessary component of each...
3 Steps to Shore Up Your Mainframe Security with Endpoint...
For decades, mainframes were practically locked away like vaults, and it was easy to take their...
The Mainframe Security Intelligence Gap
If you have a mainframe, it is nearly guaranteed that you are a professional organization who...
Changing Consumer Conceptions of PII Data Necessitate Event...
Europe’s Data Protection Directive emerged in 1995, just two years after the formation of the...
How BMC Defends the Mainframe from Modern Security Threats
Enterprises Are Modernizing the Mainframe, but They Shouldn’t Stop Short of Security The experts...
Top 10 Privilege Escalation Hacks For The Mainframe
“These files are secure, you would need special and operations privileges to access them!” I’ve...
Audit Compliance Will Not Stop a Mainframe Hacker
If your company uses big iron to power your IT infrastructure, then you have sensitive data which...