One of BMC Software’s most exciting announcements this year was the acquisition of Compuware,[1]...
Security & Compliance Blog
Myth Debunked: My Mainframe Can’t Be Hacked
BMC AMI Z Talk · Episode 3: Myth Debunked – My Mainframe Cannot Be Hacked In this episode...
Post-Mortem of a Mainframe Hack
BMC AMI Z Talk · Episode 6: Post-Mortem of a Mainframe Hack In this episode of BMC AMI Z Talk...
Time to Train? Getting the Right People and Skills to Optimize...
Does a post-coronavirus world mean new opportunities to access and benefit from mainframe skills...
Cybercrime Rising: 6 Steps To Prepare Your Business
You probably wouldn’t think of leaving your house with the door unlocked, or even open. If you have...
BMC Solutions for Infrastructure Automation: How They Can Help...
IT professionals are continuously overwhelmed with the number of tasks they need to perform every...
Remote Working: Delivering Mainframe Security Services in the...
As countries went into lockdown and social distancing and remote working became the norm, our...
Top 8 Ways Hackers Will Exfiltrate Data From Your Mainframe
In previous blogs I have already illustrated the various ways hackers will gain initial access to...