MC Press Online

Saturday, Apr 29th

Last updateFri, 28 Apr 2017 10am

You are here: Home ARTICLES Security Security - Other

Security - Other

New from MC Press: Identity Management: A Business Perspective

Technology advances like cloud, mobile, and Internet of Things have made identity and access management more important than ever, and also more complex. How can business leaders get a handle on their evolving identity needs?

by Anne Grubb

By making identity management a core part of business strategy, says Graham Williamson in his latest book, Identity Management: A Business Perspective. Williamson, a consultant whose expertise includes identity and access management (IAM), has written the book to help senior-level technology managers understand IAM, so they can mitigate risks and implement robust, secure identity strategies in their organizations.

Read more ...

TechTip: Let's Encrypt, Together

Automation and security are top priorities. IBM i is a first class citizen if we let it be. If we take the effort to get more open source on the platform. This article does that.

aaron bartellWritten by Aaron Bartell

If you haven't noticed, security is regularly in the news and generally has been a hot topic the past couple years. Most recently, there was the Kemuri Water Company breach, which unfortunately was against their "AS/400." The quote still ringing in my ears from that article is the following:

Read more ...

When Management Turns Its Back on Security: The Business Effects

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners, a HelpSystems company

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.

Read more ...

Protect Your Administrator Accounts from Abuse

Carol discusses why it's important to protect administrative profiles and provides options for protecting them.

carol woodburyWritten by Carol Woodbury

If you've paid attention to the news of stolen data, you've heard that many of the attacks come after malware is installed somewhere in the network. Once installed, the malware often sniffs the network to get credentials (user IDs and passwords). The malware keeps trying these credentials until it captures an admin's, and then the hackers gain access to servers with admin rights to gain access to other parts of the network and your data.

Read more ...

Partner TechTip: IBM i's Greatest Strength Is Also Its Worst Security Weakness

What happens when reputation collides with reality?

robin tatamWritten by Robin Tatam

According to IBM's website, "the IBM i operating system is considered one of the most secure systems in the industry." It's true that IBM i has a near-legendary reputation as a secure system based on its world-class integrity features and security controls. But, as the author of PowerTech's annual "State of IBM i Security Study" for the past seven years, I feel the description as "secure" is often dangerously misunderstood.

Read more ...

Partner TechTip: Keep Friends Close and Powerful Users Closer

Your IBM i users are human—and prone to putting sensitive information at risk.

robin tatamWritten by Robin Tatam

Information will always be at risk, thanks to human failings like greed and incompetence. As guardians of our enterprise data, it's our responsibility to deploy controls and enforce policies designed to reduce the risk of a data breach, no matter what might cause it.

 

Note that I didn't say eliminate risk—that's an important distinction. If history has taught us anything, it's the old cliché "where there is a will there is a way." We have to accept that there is no such thing as zero risk.

Read more ...

Partner TechTip: "Oh! Data Breach" Is Quickly Becoming the New U.S. National "Anthem"

The current breach epidemic could impact IBM i, but it doesn't have to.

robin tatamWritten by Robin Tatam

Unless you're filing your taxes with an address listed as "under a rock," you're probably painfully aware of a few high-profile data breaches that have occurred in recent years. While Target, Home Depot, and Anthem might not openly share whether any of their compromised systems included IBM Power Servers, we all need to learn numerous lessons, regardless of the technology platform our critical data resides upon.

Read more ...

TechTip: A Primer on Payment Security

If you handle credit card payment data in your company, you're probably familiar with the Payment Card Industry Council. But they're no longer the only game in town. Maybe it's time to look at the broad issues.

david shireyWritten by David Shirey

If you handle credit card payments in your company, you know that PCI compliance has been the gold standard for the last decade. And if you've been paying any attention lately, you know that Apple Pay was announced in October 2014 and is getting a lot of press as being the future of electronic payments.

Read more ...