Security

Protection against malware: IBM AIX has your back

IBM Systems Lab Services, Power Systems, Security

“How can we protect our IBM AIX systems from malware attacks?” As a cyber security consultant, I come across this question more than any other when it comes to securing servers running IBM AIX. Most security breaches today are based on malware attacks, especially in banking sector. The infamous FASTCash malware has infected many banks’ ...read more


The next big leaps for IBM modern data protection

Data security, Multicloud, Storage

Recent analyst research indicates why hybrid multicloud support is becoming increasingly important. According to a 2019 ESG report [1], 67 percent of organizations surveyed currently use public cloud services in their data protection environment. Among those companies, on average 26 percent of their protection environments (measured by amount of data) are housed in the cloud, ...read more


Riding LinuxONE Systems in the hybrid cloud

Data security, LinuxONE solutions, Open source

Alf Thunberg often rides a motorcycle to the office. He repairs his two motorcycles himself, and rides the vintage bikes to work, wearing his helmet and a business suit. He’s taking an all-in-one approach to his daily travels, reducing unnecessary costs wherever possible. He applies the same approach to deploy client applications on scalable data ...read more


Spartan Group helps accelerate demand for digital asset-based products

Blockchain, Data security, LinuxONE solutions

Digital assets, particularly in the form of cryptocurrencies and tokens, have been the subject of a great deal of press coverage over the last 18-24 months. Research from Fidelity Investments suggests that 22 percent of institutional investors are already exposed to digital assets, with 40 percent being open to future investments.[1] These figures demonstrate an ...read more


Announcing IBM Cloud Hyper Protect DBaaS for MongoDB

Cloud computing, Data security, LinuxONE solutions

As business leaders look to leverage the cloud, enterprises in highly regulated industries are typically concerned about protecting confidential and sensitive customer data. We have seen that public reports of unauthorized user access, encryption details, or exposure of data by internal users have been rising at an alarming rate. Given the high average cost of ...read more


Using LinuxONE to transform and protect your business, May 2019

Data security, LinuxONE solutions, Security

Your transition to the cloud can only be successful if your data and your environment are secure. Your business, your customers and your partners depend on it. In addition, any interruption to your business can result in lost revenue, trust and ultimately reputation. At IBM, we are committed to providing solutions that maintain your data ...read more


New content to maximize your IBM Z investment, May 2019

Encryption, Mainframes, Security

Risks are inherent in any IT environment. Your challenge is to minimize that risk and build a cloud strategy that ensures resiliency, reliability and security to protect your business and customers. Your use of IBM Z secured infrastructure within your cloud strategy can help drive the transformation that you need to stay ahead of the ...read more


A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


The Best of IBM Z and LinuxONE in the public and private cloud

Cloud servers, Data security, Hybrid cloud...

In our hybrid cloud world, IT leaders view choice and control as strategic assets when it comes to their infrastructure. But when deploying hybrid cloud strategies one of the biggest challenges for enterprise cloud adoption is security, often slowing down the digital transformation process. Concerns ranging from trust to data protection and compliance are top ...read more