article thumbnail

Still not dead: The mainframe hangs on, sustained by Linux and hybrid cloud

Network World

Take recent news as an example: According to IBM, 75% of the top 20 global banks are running the newest z15 mainframe, and the IBM Systems Group reported a 68% gain in Q2 IBM Z revenue year-over-year. ori participation in IT : diversity insights for CIOs everywhere • IT snapshot: Ethnic diversity in the tech industry ].

IBM 209
article thumbnail

Modernizing the mainframe for the digital era

CIO Business Intelligence

I’m a banking technologist,” says the CIO for retail, business, and digital banking at M&T Bank. He’s doing just that on the bank’s IBM Z system mainframes, for which the bank has written some 10 million lines of code over the years. The bank’s use of its mainframes is two-pronged. M&T Bank.

IBM 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

Emotet, originally a banking trojan, has transformed into a versatile piece of malware that relies on massive spam email campaigns. Linux, known for its security advantages, was previously considered less vulnerable compared to other operating systems. It's estimated LockBit had nearly 1,100 victims in 2022 alone.

Trends 67
article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

Virtually every industry, from healthcare to banking and everything in between, has rules for how businesses handle data. The Linux Audit system is a great solution. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. Compliance Scanning.

article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

According to the new Uptycs whitepaper, Detecting the Silent Threat: 'Stealers are Organization Killers' (gated link), a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems. This year, however, there are multiple new info stealers arising that target all three platforms: Windows, Linux, and macOS.

Malware 63
article thumbnail

Cloud Migration Fundamentals

Linux Academy

When I was with Red Hat, I had the opportunity to work with a team from a leading bank. I was part of a conversation with the bank’s CIO after they had completed their first migration to the cloud. The post Cloud Migration Fundamentals appeared first on Linux Academy Blog.

Cloud 60
article thumbnail

Technology Short Take #81

Scott Lowe

Here’s a handy list of deprecated Linux network commands and their replacements. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. Part 1 covers how to choose a Linux distribution, and part 2 discusses some security tips for installing Linux on your SysAdmin workstation. Virtualization.

Vmware 60