Trend Watch
Lockdown Data With Cryptography
SHARE Headquarters | Mar 24, 2022
Technology
Security Vulnerabilities and How to Plug Common Security Holes
SHARE Headquarters | Mar 10, 2021
Pervasive Encryption: Upgrading AT-TLS to TLS 1.2 or 1.3
SHARE Headquarters | Jan 11, 2021
Measuring the Compute Cost of Encryption on Z with zBNA
Joseph Gentile | Aug 31, 2020
Get the Full Picture: Why Pervasive Encryption Is Only One Part of the Security Jigsaw
Mark Wilson | Sep 19, 2018
Confused About Encrypting Data at Rest vs Pervasive Encryption?
Jamie Pease | Aug 21, 2018
Encryption at Scale: A Matter of Shifting Priorities
SHARE Headquarters | Mar 29, 2018
SHARE Updates
IBM Systems Magazine: Editor's Picks, February 2018
SHARE Headquarters | Feb 13, 2018
Blockchain Through the Prism of Pervasive Encryption: Part 2
Anna Shugol | Feb 13, 2018
AI at the Heart of IBM z/OS 3.1 to Simplify and Optimize
Khadija Souissi and Iris Rivera | Apr 30, 2024
The Dark Web: Speculation, Exaggeration, and Threat Intelligence
Leanne Wilson | Apr 8, 2024
The Coded Code: EBCDIC Re: Morse
Reg Harbeck | Mar 25, 2024