• LEAD ARTICLE: Insiders Are a Threat to IBM i? No Way! Yes Way!
• FEATURED ARTICLE: TechTip: C# for RPGers - Easily Removing Duplicates, Sorting, and Reversing Lists
• NEWS HIGHLIGHT: Profound Logic and iVolution Partner to Bring IBM i Modernization Solutions to Businesses in Italy
• ON-DEMAND WEBCAST: Data Breaches: Is IBM i Really at Risk?
• FEATURED VIDEO: Insider Threat Protection Services from IBM
• EVENT: Real-Time IBM i Log Collection & Monitoring
Carol discusses how the current thoughts on insider threats needs to be redefined and how insider threats can leave IBM i vulnerable.
Written by Carol Woodbury
I read an interesting article that discussed a study done by the Ponemon Institute on the “Cost of Insider Threats.” It piqued my interest because most of the people I talk to in the IBM I world don’t believe there’s any threat by people from inside their organization. The two reasons I hear most are “I trust our employees” and “Our employees would have no clue how to get access to the system through something like ODBC. They can barely sign on to their green-screen menu.” I decided to read the actual study to determine if there was applicability to the IBM i world.
The Study defined three types of insider threats:
All Data and Software Resides on the IBM i: Everything is centralized and secure.
Graphical Designer: Design labels in minutes.
Integrate and Print with Existing Apps: Call from RPG, COBOL, CLP and JAVA programs.
Compliance Labels Provided: Extensive library of predesigned label templates.
Supply Chain Solution: Easily integrated into any IBM i ERP or WMS solution.
TL Ashford - Since 1983
Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!
This ain’t your mama’s RPG! Time to move on from OPM—with Evolve Your RPG Coding. This comprehensive new book gives you all the tools to move to a more modern, modular, and efficient ILE RPG. The book guides you through the transition at a comfortable pace, making every ILE concept totally accessible. You’ll start with simple, easy-to-understand examples and analogies to OPM, then advance to complete and complex ILE code. Finally, you’ll go beyond ILE with a detailed discussion of SQL, code organization, and structure. Order your copy today!
This time around, I’ll show how to perform some operations over lists that typically require some heavy coding.
Written by Rafael Victória-Pereira
Start by opening Visual Studio and locating the IntroducingLists.sln project. I’ll be using it on this TechTip to explain some more interesting methods that can save you a lot of time. Last time around, I stopped after inserting the missing old name of the IBM i. Now let’s re-add a couple of names to see how duplicates can be easily removed with a single line of code.
IBM i is known for its security, but this OS could be more vulnerable than you think.
Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.
Plus Choose From The Outstanding Selection in our MC Webcast Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.