Search for tag: "cryptography"

How can you ensure your z/OS network traffic is properly protected? zERT has the answer!

As you extend your Pervasive Encryption for IBM Z® strategy to your z/OS network traffic, it is imperative to assess and understand the quality of the cryptographic network protection being…

From  2700024GAM 2700024GAM on June 1st, 2020 3 plays

Blockchain Explained

Blockchain provides users a more secure record, called blocks, of their transactions that are linked using cryptography. Each block contains a cryptographic hash of previous block, a timestamp, and…

From  5500021X6T 5500021X6T on August 16th, 2019 9 plays