Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More

Mainframe applications may not be as secure as you think

Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security. The mainframe has a reputation for being a data vault, but some enterprises may not know who has the keys, State Robert Gates, News Writer, Tech Target, Nov 2015.

Read More

Xbridge Systems’ Philip Young, a “Modern-day Mainframe Superhero,” will Discuss Legacy System Security at ISACA’s North America CACS Conference

Philip Young, CISA, CISSP, B.A. Computer Science, ZedSec390, Hacker Title: Information Security Engineer, will discuss Legacy System Security, on Wednesday, 4 May 2016, at 8:30 a.m., session 314, at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Join Xbridge Systems for a candid talk about IBM® z/OS systems and … Continued

Read More

Xbridge System, CorreLog, Inc., Inc. announce the first fully integrated data discovery, and Security Information & Event Management (SIEM) DLP solution for IBM® z/OS

Xbridge Systems, Data Discovery experts for z/OS, in conjunction with CorreLog, the leader in multi-platform IT security event log management, today announced the unveiling of their comprehensive DLP and real-time event auditing solution for z/OS mainframe security and compliance at SHARE San Antonio, February 28-March 4. CorreLog and Xbridge’s technology partnership and resulting solution offers … Continued

Read More

Internet of Things Managed By- Mainframes?

Mainframes are still one-of-the most dependable work-horse host systems around handling incredible workloads. “Most current systems aren’t going to be able to handle that (those peak demands are going to be less peak-like, and more flat, but at those higher, peak-like levels), and the cloud isn’t going to help this time. The exception is mainframe … Continued

Read More

Insurers Look to Tighten Cybersecurity Before Innovation

“Ensuring the privacy and confidentiality of customer information in a rapidly evolving mobile insurance marketplace is challenging,” he says. “Issues range from how to sufficiently authenticate the user of a mobile device, to how to effectively provide end-to-end protection for payment and other sensitive transactions. Finding the appropriate balance between usability and security is critical.” … Continued

Read More

From security laggards to cyber warriors.

“Every federal agency that tracks cyber incidents has placed healthcare at the head of the pack in terms of risk. Every threat center or company that monitors security and publishes statistics and studies on the topic of cyber incidents has identified healthcare as the number one targeted industry”, stated Mac McMillan, Healthcare IT News, January … Continued

Read More

Mobile Payment—More Secure Than Conventional Payments?

Mobile payments can make the payment process for consumers much more convenient, eliminating the need to carry or pull out a physical credit card. Consumers can register their credit and debit cards (often simply by using the camera on their phone) into a secure wallet. This wallet may be stored in the cloud, on the … Continued

Read More

CIOs see the mainframe playing a central role in the future of the digital enterprise. 88% agreed that the mainframe will continue to be a key business asset over the next decade

A Global Survey Reveals Companies at Risk From Inadequate Planning for Generational Shift in Mainframe Stewardship. A survey of 350 CIOs regarding the use and management of mainframe hardware and software in the enterprise uncovered a profound disconnect between the continued importance of the mainframe to the business and the actions CIOs are taking to protect … Continued

Read More

New Payment Card Malware Hard to Detect and Remove

Payment card data is highly sought after by cybercriminals, who have in recent years targeted very large organizations that handle card data. Target, Home Depot and many others have reported large data breaches over the years. Some payment processors were also hit. FireEye says it has discovered a type of malware designed to steal payment card … Continued

Read More

Enterprise Security & the Mainframe: A holistic Approach

A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware.  Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive … Continued

Read More

US health care way behind on data security, says Forrester

Despite high-profile hack attacks, like the Anthem breach in which cybercriminals exposed 80 million medical records, the health-care industry continues to shortchange Americans when it comes to protecting their data. That’s the key takeaway from a new cybersecurity report from Forrester.

Read More

Half admit that they ignore data protection policies at work to get their job done…

40% of security experts predict insider data breaches in coming year. Partially attributed to poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider. Heath Davies, chief executive at Clearswift said, “The detachment between the front line security professionals and board members within … Continued

Read More

Why Banks Need to Prepare for More Chase-Like Breaches

Cybercriminals will increasingly target banks and brokerage firms for market information and PII they can use to perpetrate their schemes, as was described in this week’s indictments tied to the JPMorgan Chase attack, Pascual predicts. Protecting data is going to prove increasingly challenging because attackers are relentless and cybercrime is becoming a big business, Pascual says. … Continued

Read More

The Wall Street Journal |The CIO Report: What’s critical …

CIO Voices: How Symantec’s Sheila Jordan Built a Data Center in Four-and-a-Half Months. In the article, WSJ (asks): As you built out your infrastructure and the software-defined network, how did security fit in? SJ (reply): “All applications are different. An ERP is not equal to maybe a social tool. You want to make sure you’re looking … Continued

Read More

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances tracked by Netskope. Personally-identifiable information (PII) accounted for an additional 13.7 percent of violations. The technology and IT services vertical had the second-highest proportion of total violations, at … Continued

Read More

Cyber-Security Wake Up Calls

A list of major events that should have served notice that much more needs to be done by thwart cyber threats. Why can be done to cure “Cyber Threat Amnesia”?

Read More

SEC weighs cybersecurity disclosure rules

The Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

Read More

Airlines Under Siege From Hackers

Cyberattacks hit the airline industry and U.S. air traffic control while requirements to report incidents or “even adhere to specific cybersecurity standards” are lacking.

Read More