Even the securest IBM Z installations in top security environments are exposed to hacking threats that are underestimated, downplayed or simply unknown to most mainframe operations and security teams. What is your risk exposure, what methods social hackers are using and what are recommended steps to protect yourself from those dangers?
15 rules to protect IBM Mainframe Systems from hacking!
