Trend Watch
Lockdown Data With Cryptography
SHARE Headquarters | Mar 24, 2022
Technology
Security Vulnerabilities and How to Plug Common Security Holes
SHARE Headquarters | Mar 10, 2021
Pervasive Encryption: Upgrading AT-TLS to TLS 1.2 or 1.3
SHARE Headquarters | Jan 11, 2021
Measuring the Compute Cost of Encryption on Z with zBNA
Joseph Gentile | Aug 31, 2020
Get the Full Picture: Why Pervasive Encryption Is Only One Part of the Security Jigsaw
Mark Wilson | Sep 19, 2018
Confused About Encrypting Data at Rest vs Pervasive Encryption?
Jamie Pease | Aug 21, 2018
Encryption at Scale: A Matter of Shifting Priorities
SHARE Headquarters | Mar 29, 2018
SHARE Updates
IBM Systems Magazine: Editor's Picks, February 2018
SHARE Headquarters | Feb 13, 2018
Blockchain Through the Prism of Pervasive Encryption: Part 2
Anna Shugol | Feb 13, 2018
Intro to the Mainframe Series — COBOL: The Business Language Everybody Needs
Derek Britton | May 21, 2026
Quantum Challenges Ahead: Join SHARE’s Blueprint Event to Future-Proof Mainframes With Post-Quantum Cryptography
Tom Cosenza | May 19, 2026
What Is High Level Assembler (HLASM)? — Intro to the Mainframe Series
John Rhodes | Apr 20, 2026