<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading


  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading


Stay up to date

mainframe, tectia ssh

2015 - The Guardians of the Mainframe Legacy
By David Rivard on January 5, 2015

Another year has come and gone. For me, this is my 32nd anniversary in the IT field and the 21st in Security. Time has certainly flown by since punch cards, reel-to-reel tape, and thermal...

Continue Reading


Now Distributed People Can Stop Complaining About z/OS
By John Walsh on July 15, 2014

Many companies have a mix of distributed platforms and mainframes (z/OS) in their environment. Most distributed users do not understand z/OS too well and don’t want to, but they still have...

Continue Reading

mainframe, key management, identity and access management

The Mainframe and IDM
By David Rivard on July 6, 2014

Identity Management Projects always result in lower costs and Streamlined Security Administration. Where have you heard that one before? Since the mid 1990's there has been a talent drain...

Continue Reading