Technology
CICS Vulnerabilities Uncovered — And How to Secure Your CICS Applications
Serena Agusto-Cox | Feb 17, 2025
Mainframe IT Roles: CICS Programmers and Teamwork
SHARE Headquarters | Jun 9, 2023
Industry Voices
For those installing at the end of the year...
Marna WALLE | Jul 27, 2022
Jumpstart Your Java on CICS TS
SHARE Headquarters | Sep 30, 2021
Must-listen Mainframe Industry Podcasts Roundup
SHARE Headquarters | Sep 21, 2021
Dusty Rivers: Prepare Before API Implementation
SHARE Headquarters | Apr 16, 2020
Using IPCS to Solve CICS Failures
SHARE Headquarters | Apr 2, 2020
Case Study: Transforming Z Applications with APIs, Continuous Integration / Continuous Delivery, and Modern Languages
SHARE Headquarters | Mar 5, 2020
Marna's Musings: A Beautiful Day in the (Shopz) Neighborhood
Marna Walle | Dec 6, 2019
Beating the Quantum Clock: Today’s Security Against Tomorrow’s Threats
Jessica Doherty | Oct 21, 2025
File Integrity Monitoring (FIM) What’s the Deal?
Mark Wilson | Oct 16, 2025
Cybersecurity Is All Our Concern: 7 Steps to Mitigate the Risks
Niall Ashley | Oct 7, 2025