You believe you're safe. But are you sure? Written by Heather Richards
So you've read the title, and I know what you're going to say. No way; not mine. It's a natural response. After all, you take security seriously. You've equipped your client PCs with anti-virus software, and you have solid network security in place on your Power Systems server. But are you certain that's enough?
IBM has announced the creation of a new practice focused on delivering advanced analytic solutions to public sector clients. IBM will expand its work with federal, state and local government organizations, as well as in fast-growing markets such as healthcare and education.
Take control of which profiles have been assigned special authorities instead.
Written by Carol Woodbury
Every so often, I get asked for a list of "sensitive" commands that need to be secured. This request always puzzles me. If you control who has special authorities--especially *ALLOBJ special authority--and have a good object-level authority scheme in place, specifically securing a set of commands is usually unnecessary. Let's take a closer look.