Security


Security Patrol: Detecting a Breach PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 April 2014 00:00

Carol discusses the actions to review that may indicate your system is under attack or has been breached.

carol woodburyWritten by Carol Woodbury

Last month, I discussed the unthinkablethat your IBM i system has been breached. This month, I want to discuss ways that you can look for signs of a breach or an attack, as well as the information you'll want to retain to aid the investigation should a breach occur. Both require that your system be configured properly prior to the breach. Let's take a look.

 

Add a comment
Last Updated on Thursday, 10 April 2014 11:53
Read more...
 
Are You Meeting the PCI DSS Security Standards? PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 14 April 2014 00:00

Don’t take the requirements lightly; the cost of non-compliance could be very steep.

ira chandlerWritten by Ira Chandler

Acceptance of debit and credit cards is a growing requirement for businesses of all sizes. Since 2005, the Payment Card Industry Security Standards Council (PCI) has imposed strict mandates, the Data Security Standards (DSS), to ensure the security of the computer systems that process, transmit, and/or store sensitive credit card data.

Add a comment
Last Updated on Friday, 11 April 2014 11:42
Read more...
 
IBM i Security Administrators' Guide PDF Print E-mail
Security - Compliance / Privacy
Written by SkyView Partners, Inc.   
Monday, 24 March 2014 00:00

Security is no longer something you can put off until tomorrow.

Written by SkyView Partners

Editor's note: This article introduces the "IBM i Security Administrators' Guide" available free from the MC White Paper Center.

 

Carol Woodbury, president and co-founder of SkyView Partners, Inc., takes her years of experience and knowledge as the IBM i security expert and explains the processes that should be established and checks that should be made by every IBM i security administrator.

Add a comment
Last Updated on Friday, 21 March 2014 10:39
Read more...
 
Security Patrol: Pretend You've Been Hacked PDF Print E-mail
Security - General
Written by Carol Woodbury   
Friday, 21 March 2014 00:00

In her return to her Security Patrol post, Carol Woodbury discusses the ways you can prepare for the unthinkable.

carol woodburyWritten by Carol Woodbury

I'd like you to imagine the unthinkablethat your organization's been hacked. Please entertain that thought with me for a few minutes. Let's pretend that you've just been notified that the personal data of your organization's customers has been posted to an underground website where it's up for sale. In addition to fighting back a severe case of nausea, what do you do? You'd reach for the printed copy of your organization's incident response plan, right? What do you mean there is no such document? Are you telling me that you have never thought through this scenario and documented the steps to take in the case your organization experiences a breach?

Add a comment
Last Updated on Friday, 21 March 2014 00:00
Read more...
 
Virus Got You Down? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Monday, 24 February 2014 00:00

Defending a system against viruses involves the prevention, detection, and avoidance of attacks.

carol woodburyWritten by Carol Woodbury

Editor's note: This article introduces the white paper "Virus Got You Down?" available free from the MC White Paper Center.

 

I really should be asking, "Does a virus have your server down?" Perhaps it's the latest worm, Trojan horse, buffer overflow, or denial of service attack that's got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your website or running Domino. Whatever its function within your enterprise, IBM i has remained unaffected by virus and malware attacks. Why is that?

 

Add a comment
Last Updated on Monday, 24 February 2014 14:56
Read more...
 
User Rating: / 1
PoorBest 
PCI and What It Means to IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Monday, 10 February 2014 00:00

Do you know what's in the new version of the PCI DSS released in November 2013?

carol woodburyWritten by Carol Woodbury

Editor's note: This article introduces the white paper "PCI and What It Means to IBM i" available free from the MC White Paper Center.

 

While one may think that PCI is a thing of the past and that it's already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them, and other organizations have started to accept credit cards when they didn't in the past. To refresh everyone's memory, here's an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process, or access cardholder data need to be aware of.

Add a comment
Last Updated on Monday, 10 February 2014 00:00
Read more...
 
Technology Focus: Are You Ready for Your Next Audit? PDF Print E-mail
Security - Compliance / Privacy
Written by John Ghrist   
Monday, 20 January 2014 00:00

Unless maintaining compliance is a year-round effort in your enterprise, the answer to this question is very likely an emphatic "no!"

john gristWritten by John Ghrist

It's not often that we get to see a trendy new term enter the lexicon while being consciously aware it's happening. However, the recent holiday season may have given us that experience. Perhaps it's too early to tell for sure, but recent events should give additional meaningin the compliance market segment at leastto the term "You've been 'Targeted.' "

Add a comment
Last Updated on Tuesday, 04 February 2014 12:42
Read more...
 
Security Best Practices, Part 2 PDF Print E-mail
Security - General
Written by Dinesh Dattani   
Monday, 23 December 2013 00:00

This article is an excerpt from IBM Mainframe Security: Beyond the Basics.

dinesh dattaniWritten by Dinesh D. Dattani

"Security Best Practices, Part 1" presented several best practices for IBM mainframe security, including implementing role-based security, de-cluttering your security database, handling employee transitions appropriately, and identifying your important data. In this article, we continue the discussion with a look at some additional best practices for IBM mainframe security.

Add a comment
Last Updated on Monday, 23 December 2013 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 39

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM