09
Thu, May
2 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
17 April 2024 Securing IBM i: A Dual Responsibility IBM i (OS/400, i5/OS) | Security 1,018
21 February 2024 Top IBM i Security Issues of 2024 IBM i (OS/400, i5/OS) | Security 1,442
20 December 2023 Why Cleaning Up Is an Important Part of Your IBM i Security Practice IBM i (OS/400, i5/OS) | Security 1,994
18 October 2023 Five IBM i Security Features You May Have Forgotten About IBM i (OS/400, i5/OS) | Security 2,064
16 August 2023 The Five Characteristics of Organizations That Don’t Take IBM i Security Seriously IBM i (OS/400, i5/OS) | Security 2,248
21 July 2023 Zero-Trust Security for IBM i IBM i (OS/400, i5/OS) | Security 2,783
16 June 2023 A Moment with Carol Woodbury: Taking the Mystery Out of Group Profiles IBM i (OS/400, i5/OS) | Security 2,508
17 May 2023 A Moment with Carol Woodbury: The Benefits of Authorizations Lists IBM i (OS/400, i5/OS) | Security 2,604
12 May 2023 A Moment with Carol Woodbury: Network Security Pen Testing vs. IBM i Pen Testing IBM i (OS/400, i5/OS) | Security 2,480
19 April 2023 Viewing and Managing Authority Collection Using New Navigator for i IBM i (OS/400, i5/OS) | Security 3,454
14 April 2023 A Moment with Carol: What Are the Benefits of Pen Testing the IBM i? IBM i (OS/400, i5/OS) | Security 2,579
10 March 2023 Penetration Testing - Limited capability users can’t access data…. right? IBM i (OS/400, i5/OS) | Security 1,485
01 March 2023 Penetration Testing - Do you need proof your Exit Point software is working? IBM i (OS/400, i5/OS) | Security 1,877
15 February 2023 Can Security and Artificial Intelligence (AI) Mix? IBM i (OS/400, i5/OS) | Security 1,823
15 February 2023 Penetration Testing - Do you need proof that Menu Security is sufficient? IBM i (OS/400, i5/OS) | Security 1,385
21 December 2022 IBM i Security Lessons Learned in 2022 IBM i (OS/400, i5/OS) | Security 2,245
19 October 2022 Getting Started with IBM i Security IBM i (OS/400, i5/OS) | Security 2,394
16 September 2022 Mastering IBM i Security - Technology Overview IBM i (OS/400, i5/OS) | Security 2,751
17 August 2022 Using IBM i Services to Manage Object Authority Settings IBM i (OS/400, i5/OS) | Security 3,096
15 June 2022 Carol’s Top Five Favorite Security Enhancements in IBM i 7.5 and 7.4 TR6 IBM i (OS/400, i5/OS) | Security 5,481
20 April 2022 Do You Know What End Users Can Do with IBM i Access Client Solutions? IBM i (OS/400, i5/OS) | Security 4,711
16 February 2022 Using IBM i Services to Manage Owned Objects IBM i (OS/400, i5/OS) | Security 4,847
15 December 2021 Top 10 IBM i Security Wishes for Christmas and the New Year IBM i (OS/400, i5/OS) | Security 4,137
17 November 2021 Security Considerations for PCs and Mobile Devices IBM i (OS/400, i5/OS) | Security 2,971
20 October 2021 Using the Security Features in New Navigator for i IBM i (OS/400, i5/OS) | Security 6,685
18 August 2021 Controlling Access to SSH on IBM i IBM i (OS/400, i5/OS) | Security 10,325
16 July 2021 File Shares: Accessing Objects in the IFS IBM i (OS/400, i5/OS) | Security 13,717
16 June 2021 Using the New Security Features in the Latest IBM i Technology Refreshes IBM i (OS/400, i5/OS) | Security 4,718
21 April 2021 Modernize Your IBM i User Profile Management IBM i (OS/400, i5/OS) | Security 6,384
12 March 2021 Managing Authorities to IFS Objects IBM i (OS/400, i5/OS) | Security 13,416
12 February 2021 Lessons IBM i Shops Can Learn from the SolarWinds Attack IBM i (OS/400, i5/OS) | Security 2,903
15 January 2021 5 Actions for IBM i Administrators in the New Year IBM i (OS/400, i5/OS) | Security 2,963
11 December 2020 IBM i Technology Refreshes and Other Things I’m Thankful for in 2020 IBM i (OS/400, i5/OS) | Security 2,506
13 November 2020 Using SECTOOLS to Determine Your Current IBM i Security Settings IBM i (OS/400, i5/OS) | Security 4,882
16 October 2020 The Case for Using Authorization Lists to Secure IBM i Objects IBM i (OS/400, i5/OS) | Security 5,331
11 September 2020 How Can I Tell Whether All the Connections to My IBM i Are Secure? IBM i (OS/400, i5/OS) | Security 6,025
14 August 2020 Is Authority Collection a Replacement for the Audit Journal? IBM i (OS/400, i5/OS) | Security 2,954
10 July 2020 If I Had Only 5 Minutes, I’d Check These 5 IBM i Security Configurations IBM i (OS/400, i5/OS) | Security 3,977
12 June 2020 Configurations That Will Bite You IBM i (OS/400, i5/OS) | Security 3,051
15 May 2020 Tips for Staying Sane IBM i (OS/400, i5/OS) | Security 2,378
10 April 2020 Practical Security Tips to Survive COVID-19 and Working from Home IBM i (OS/400, i5/OS) | Security 2,985
13 March 2020 Why Encryption? IBM i (OS/400, i5/OS) | Security 4,285
14 February 2020 Are You Using the Tools IBM Has Provided? IBM i (OS/400, i5/OS) | Security 4,157
17 January 2020 Tips for Auditing an IBM i IBM i (OS/400, i5/OS) | Security 5,905
13 December 2019 What IBM i Information Should I Be Sending to My SIEM? IBM i (OS/400, i5/OS) | Security 4,621
15 November 2019 Why Do We Ignore the Insider Threat? Analytics & Cognitive | 3,486
11 October 2019 Has My IBM i Been Breached? IBM i (OS/400, i5/OS) | Security 4,106
13 September 2019 Tips for Securing the Integrated File System (IFS) IBM i (OS/400, i5/OS) | Security 8,065
16 August 2019 Tips for Avoiding Malware on IBM i IBM i (OS/400, i5/OS) | Security 4,433
12 July 2019 Carol Answers Her Top 6 Most-Asked Questions IBM i (OS/400, i5/OS) | Security 3,289
Carol Woodbury

 

Carol Woodbury is President and CTO of DXR Security and has over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies – SkyView Partners and DXR Security. Her current company - DXR Security - specializes in penetration testing for IBM i. Her practical experience together with her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known world-wide as an author and award-winning speaker on security technology, specializing in IBM i Security topics. She has written seven books on IBM i Security. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.

 


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance: Second Edition IBM i Security Administration and Compliance: Second Edition
Get the must-have guide by the industry’s #1 security authority.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance IBM i Security Administration and Compliance
For beginners to veterans, this is the definitive security resource.
List Price $69.95

Now On Sale