Encryption

IBM z15 sets a new cloud security standard

Encryption, Mainframes, Multicloud

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. On September 12, 2019, in New York City, IBM set a new ...read more


IBM z15 – The cloud you want with the privacy and security you need

Cloud computing, Encryption, Mainframes

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. I had the pleasure of attending the recent launch of the brand ...read more


IBM LinuxONE III: Built for the cloud with privacy and security

Encryption, LinuxONE solutions, Multicloud

From talking to businesses and clients, we know that as enterprises embrace a hybrid multicloud strategy, they often struggle finding ways to address concerns around security, scalability, flexibility of the platform they choose, and the resiliency required to prevent downtime. When developing the newest generation of IBM LinuxONE™ we kept these concerns top-of-mind. We addressed ...read more


Digital Asset Custody Services (DACS) aims to disrupt the digital assets market with a secured custody platform

Blockchain, Encryption, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.   A revolution in how consumers and businesses exchange value is underway right now. ...read more


New content to maximize your IBM Z investment, May 2019

Encryption, Mainframes, Security

Risks are inherent in any IT environment. Your challenge is to minimize that risk and build a cloud strategy that ensures resiliency, reliability and security to protect your business and customers. Your use of IBM Z secured infrastructure within your cloud strategy can help drive the transformation that you need to stay ahead of the ...read more


A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more


Is your smartphone data safer than your enterprise data?

Data security, Encryption, Linux systems...

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only ...read more


Three ways to collaborate to improve cybersecurity

Data security, Encryption, Linux systems...

The stakes are high in enterprise security. Data breaches can damage your organization’s reputation and result in significant costs (USD 3.86 million for every breach on average according to this Ponemon Cost of a Data Breach study). They can also destroy customer trust. Recent research has found that more than 78 percent of customers would ...read more