Security


What Treasures Are in Those Reports on Your IBM i's IFS? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 22 January 2016 00:00

Carol provides guidance on protecting data in printed reports.

carol woodburyWritten by Carol Woodbury

I get inspiration for this column from a variety of places, but I have to give credit to one of my clients for this article. As he duly pointed out, there's a lot of "interesting" information to be found in spooled files and in PDFs in IFS directories that are left on the system—sometimes for a very long time. So thanks to TJ for inspiring me to write about this important topic.

Add a comment

Last Updated on Monday, 18 January 2016 13:02
Read more...
 
"Mission Attainable: Rogue Server" PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Robin Tatam   
Monday, 04 January 2016 00:00

A Hollywood Blockbuster Cluster

robin tatamWritten by Robin Tatam

Government agent Heathen Runt slips into his specialized climbing gear, and in a pocket of his magnetic backpack, he stashes the thumb drive he will use to access the server. He then embarks on the long, arduous ascent to the top of the precipice that marks home to the impenetrable data center belonging to the evil organization known as Server People Hampering Integration of New Core Technologies, or SPHINCTer.

Add a comment
Last Updated on Monday, 04 January 2016 00:00
Read more...
 
What Perturbs Carol About IBM i Security? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 December 2015 00:00

Carol provides her pet peeves when it comes to IBM i security configuration.

carol woodburyWritten by Carol Woodbury

At this time of year, many lists of favorites are published, but I thought I'd take a slightly different twist and publish my list of IBM i security pet peeves.

Add a comment
Last Updated on Friday, 18 December 2015 00:00
Read more...
 
Time to "Redecorate" Your IBM i? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 November 2015 00:00

Carol provides suggestions for ways you can "spruce up" your security configuration.

carol woodburyWritten by Carol Woodbury

I've been in my house for a while now, and I'm looking around and thinking that it's time for a little redecorating. I did a major renovation about three years ago, but now some walls need to be painted and I need to switch out some accessories. My problem is that I can never come up with the ideas myself. I always need to look through some home decorating magazines first. So just in case you're in the mood to redecorate your IBM i, here are some suggestions for freshening up the décor of your security configuration.

Add a comment
Last Updated on Friday, 20 November 2015 00:00
Read more...
 
CAMSS in Conversation: Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 16 November 2015 00:00

Security modernization must be a part of your overall modernization strategy.

steve pitcherWritten by Steve Pitcher

This article continues the series that temporarily replaces my "In the Wheelhouse" column. Through the rest of this year, I'll discuss IBM's Cloud, Analytics, Mobile, Social, and Security (CAMSS) initiative. I started by addressing strategy and providing an overview.

 

Security is the underpinning of all the other elements of CAMSS. Joining me this week is IBM's Jeff Uehling, Architect for IBM i Security.

Add a comment
Last Updated on Monday, 16 November 2015 00:00
Read more...
 
If Your IBM i Is Hacked, How Long Will It Be Before You Know? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Robin Tatam   
Monday, 26 October 2015 00:00

Data breaches are often born out of poor configuration and user indifference. They always thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!

robin tatamWritten by Robin Tatam

Before delving too far into a discussion about how to recognize when a hack occurs, it is critical to first acknowledge that hacking an IBM i server is even possible. For many, the term "hack" conjures up the image of hardened cyber-criminals covertly circumventing perimeter defenses; however, the reality is often distinctly easier and far less dramatic. In my opinion, hacking describes any form of unauthorized access to data and programs, including when that access originates from inside the firewall, not just the exploitation of an inherent flaw in the operating environment.

Add a comment
Last Updated on Monday, 26 October 2015 00:00
Read more...
 
When Management Turns Its Back on Security: The Business Effects PDF Print E-mail
Security - General
Written by Help Systems, LLC   
Monday, 26 October 2015 00:00

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners, a HelpSystems company

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.

Add a comment

Last Updated on Thursday, 22 October 2015 10:38
Read more...
 
I Need to Start Somewhere, but Where? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 16 October 2015 00:00

Carol provides three questions you'll need to answer to get you started on your journey toward a more secure IBM i system.

carol woodburyWritten by Carol Woodbury

The realization hits that you need to do something about the security configuration on your IBM i, but you don't know where to start.

 

The good news is that I'm talking to more organizations that want to do something about their IBM i security settings. The bad news is that many organizations don't know where to start. And I really shouldn't classify it as "bad news." I think the better characterization is frustration. In this article, I pose questions to help you get past the frustration and help you get started.

Add a comment
Last Updated on Friday, 16 October 2015 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 44

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM