Skip to content
Go2bSecure
  • DataPASS
  • DataPASS Hub
  • z/OS Courses
  • Partners
  • Regulations
  • About Us
  • Blog
  • Contact
  • English
    • Español (Spanish)
Contact

Blog

what-is-dora-regulation

What is DORA regulation? Complete summary of the digital operational resilience act

Leer más
csa-rewrite

CSA Rewrite. A vulnerability that took decades to close

Leer más
z os mainframe

Once Upon a Mainframe: A Realistic Simulation of a Logic Bomb Attack

Leer más
des algorithm

Understanding “The Fly” in z/OS and strengthening password security

Leer más
DORA compliance

How to prepare your IBM z/OS mainframe infrastructure for full DORA compliance

Leer más
ethical hacking

What is ethical hacking and how does it contribute to cybersecurity?

Leer más
file integrity monitoring

What is File Integrity Monitoring (FIM) in mainframe z/OS and how does DataPASS optimize it?

Leer más
security audit

What is a mainframe security audit and how does it comply with DORA and NIS2?

Leer más
what is siem

What is SIEM, and how it enhances security in your z/OS systems

Leer más
que es ransomware

Ransomware in z/OS Environments. The invisible threat that paralyzes your mainframe

Leer más
what is a mainframe

What is a mainframe? Definition, examples, and technologies

Leer más
  • DataPASS
  • DataPASS Hub
  • z/OS Courses
  • Partners
  • About Us
  • Regulations
  • Contact
  • Privacy Policy
  • Cookie Policy

Follow Us

Knowledge is Security!