
Bill Brenner
Contributor at SC Media
Contributor at Tech Target
CyberRisk Alliance VP of Content Strategy, writer, dad, husband, author of THE OCD DIARIES #InfoSec #WebSecurity #Metalhead
Articles
-
1 week ago |
scworld.com | Bill Brenner
For decades, mainframe environments have operated as independent islands of infrastructure—reliable, hardened, and often ignored by modern identity programs. While enterprise IT has embraced platforms like Okta and Azure AD to enforce MFA, conditional access, and SSO, mainframes have continued using legacy access controls like RACF, ACF2, or Top Secret. These two worlds rarely intersect. The result is a quiet but dangerous gap.
-
1 week ago |
scworld.com | Bill Brenner
For many organizations, the mainframe remains a workhorse—processing 90% of credit card transactions and serving as the system of record for critical financial data. But its security infrastructure often operates in isolation. While corporate IT environments adopt tools like Okta or Azure AD to manage identities, mainframe access still relies on older systems like RACF, ACF2, or Top Secret. The result?
-
2 weeks ago |
scworld.com | Bill Brenner
The following summarizes a recent webcast discussion between Axonius Technology Evangelist Frederico Hakamine and Enterprise Security Weekly Host Adrian Sanabria. They explore how unified risk visibility across IT and security tools can transform vulnerability management from a patchwork process into a coordinated, high-impact strategy. The complexity of modern vulnerability scanningIn the early days of cybersecurity, vulnerability management was straightforward.
-
2 weeks ago |
scworld.com | Bill Brenner
A new hybrid defense model is emerging in Managed Detection and Response (MDR), where agentic AI enhances—not replaces—human analysts, enabling faster threat response and more proactive security decisions. Redefining MDR: Humans and AI as strategic collaboratorsAs cyber threats grow more complex and persistent, security teams are under pressure to do more with less—faster. In this environment, a new hybrid defense model is taking shape.
-
2 weeks ago |
scworld.com | Bill Brenner
In a recent SC Media webcast, host Adrian Sanabria engaged in a compelling discussion with Zyston executives Brody Richter and Craig Stamm about the critical challenges facing new Chief Information Security Officers (CISOs) in today's complex business landscape. The conversation provided insights into how security leaders can transform their approach from reactive firefighting to strategic program management.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 15K
- Tweets
- 34K
- DMs Open
- No

RT @benrothke: I recently received a flurry of emails from clueless recruiters hiring for a senior medical device information security role…

RT @todayininfosec: 1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Afte…

RT @todayininfosec: 1995: The movie "Hackers" was released. It grossed $7 million at the box office against a budget of $20 million. Ouch.…