Many recent hacks have accessed networks and then accessed databases by obtaining administrator credentials (user IDs and passwords). Databases of emails and passwords are also being stolen from breached organizations. Carol discusses how to reduce password abuse.
Written by Carol Woodbury
You may not realize it, but many of the organizations recently breached are large IBM i shops. The general public never knows whether our beloved IBM i was breached because that information is never published. But to dismiss the possibility out of hand and ignore steps that you can take to protect your organization and—more importantly—the data on your IBM i systems is putting that data at significant risk. This article focuses on protecting passwords since exploiting stolen credentials (user IDs and passwords) is one method being used by hackers to gain access to data.
Whether you're a newbie or a seasoned pro, this book has something for you.
Written by Mike Faust
For System i developers, mastering the ability to develop subfile applications is an absolute must! In Subfiles in Free-Format RPG, Kevin Vandever takes the reader through the subfile concept—from start to finish. Unlike other books on the topic, this one specifically focuses on coding subfile applications in free-format RPG and does an excellent job of explaining how to use subfiles in the modern rendition of the RPG language.
In this new release of Data Governance Tools, subject matter expert Sunil Soares walks you through all of the available software tools and shows you how to evaluate them for your program. Soares explains why your organization should consider tools to be a critical component of your data governance program, clarifies how these tools integrate with big data technologies, and shows you how the various software vendors stack up. Order this latest release today!
Think you don’t need virus protection on IBM i? Here’s why you do:
- The IFS is vulnerable and most modern applications and protocols use it.
- Viruses can hide inside Java and UNIX files, and IBM i can execute them.
- Anything an administrator can do, a virus can do.
And it’s not just viruses in the traditional sense. Many types of malicious code can compromise your security. And as the news shows, these breaches happen all the time. Fortunately, it’s easy to protect your IBM Power Systems with StandGuard Anti-Virus. Key feature include:
Top 10 Security and Compliance Considerations for Cloud Computing
Whether you are using a cloud-based application or moving your whole infrastructure to the cloud, you should consider how this move effects your organization's security and compliance requirements. In this Coffee with Carol session, Carol Woodbury will discuss the top 10 considerations you should make as well as how to ensure that your organization's security and compliance requirements are not compromised.