This is the 21st blog in a series about security and how security is about how you think.
With the last six blogs, I’ve examined the six more obvious goals of security: authentication, access control, data integrity, confidentiality, availability, and non-repudiation. We need to talk about the secret seventh one: TRUST.
Posted by: Michael Kain on December 20th, 2016
This blog is about another enhancement in Release 17 that is not a product feature but a high-level explanation of the security philosophy, goals, and features in ClearPath OS 2200.
Posted by: Dr. Glen E. Newton on December 7th, 2016
ClearPath OS 2200 Release 17 continues the progression of features that you can use to secure your systems and data. Here are a few of the highlights.
Posted by: Dr. Glen E. Newton on October 5th, 2016
This is the 17th blog in a series about security and how security is about how you think.
Posted by: Michael Kain on June 9th, 2016
This blog explores the topic of access control and its method of protection.
Posted by: Dr. Glen E. Newton on April 14th, 2016
This is the 10th blog post in a series about security and how security is about how you think.
Posted by: Michael Kain on December 4th, 2015
With ClearPath Forward! we are no longer content to reflect on the past, or even keep pace. No, we have chosen to lead and in the process create the Mother of all Mainframes.
Posted by: Jim Thompson on March 8th, 2012
Jim Thompson answers the question he often gets “What’s the difference between partitioning and virtualization?”
Posted by: Sowmya Murthy on April 1st, 2011