Trend Watch
Lockdown Data With Cryptography
SHARE Headquarters | Mar 24, 2022
Technology
Security Vulnerabilities and How to Plug Common Security Holes
SHARE Headquarters | Mar 10, 2021
Pervasive Encryption: Upgrading AT-TLS to TLS 1.2 or 1.3
SHARE Headquarters | Jan 11, 2021
Measuring the Compute Cost of Encryption on Z with zBNA
Joseph Gentile | Aug 31, 2020
Get the Full Picture: Why Pervasive Encryption Is Only One Part of the Security Jigsaw
Mark Wilson | Sep 19, 2018
Confused About Encrypting Data at Rest vs Pervasive Encryption?
Jamie Pease | Aug 21, 2018
Encryption at Scale: A Matter of Shifting Priorities
SHARE Headquarters | Mar 29, 2018
SHARE Updates
IBM Systems Magazine: Editor's Picks, February 2018
SHARE Headquarters | Feb 13, 2018
Blockchain Through the Prism of Pervasive Encryption: Part 2
Anna Shugol | Feb 13, 2018
CICS Vulnerabilities Uncovered — And How to Secure Your CICS Applications
Serena Agusto-Cox | Feb 17, 2025
Industry Voices
SHARE Washington, D.C.: Lean Into Open-Source to Get the Most Out of Mainframe
Serena Agusto-Cox | Feb 7, 2025
If You’re in the Know, You Know: 5 Reasons the Mainframe Is More than Relevant Today
Greg Lotko | Jan 23, 2025