Sidebar

More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.

More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.

SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.

SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.

Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.

Whether you are using a cloud-based application or moving your whole infrastructure to the cloud, you should consider how this move effects your organization's security and compliance requirements. In this Coffee with Carol session, Carol Woodbury will discuss the top 10 considerations you should make as well as how to ensure that your organization's security and compliance requirements are not compromised.

In this session, Carol Woodbury draws on her experience consulting with SkyView Partners' clients and helping them with their PCI DSS implementation and compliance requirements. Carol explains each of the 12 sections of the Payment Card Industry's Data Security Standards (PCI DSS) and describes specifically how each relates to the IBM i community.

Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.

Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.

Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.

In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.

In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.

Page 1 of 2

MC Press Magazine

  • MC Press Magazine May 2017 Issue

    mc press magazine click to read the 2017 05 issueIt’s not just software that gets upgraded and enhanced!

    Greetings, readers! Welcome to the first edition of MC Press Magazine. As you can see, we’ve been busy making changes to ensure that your reading experience is convenient, productive, and pleasurable.

    We revised the MC Press Online website in January 2017 (MCPO V2.0) Now, we’re bringing you this new format, an e-magazine that you can read on your desktop, laptop, tablet or smartphone...or even print out if, like me, you still have a passion for paper.

    Enjoy the read!

  • MC Press Magazine June 2017 Issue

    MC Press Magazine 2017 06 read the June issueMagazines or books? Hard copy or digital? What and how do you prefer to read?

    It’s summer! It’s the time for taking vacations, putting meat on the grill, and eating fresh peaches.

    It’s also time to relax with your favorite reading material while you’re hanging out at the pool, lake, or beach. Back in the day, you’d grab your magazines and/or books and stuff them into your tote bag along with your towel, a hat, your beverage of choice, and some snacks. But these days, instead of hard copy, you’re more likely stuffing a laptop, tablet, or smartphone into your bag because that’s where your reading material resides.

    Your digitial edition of MC Press Magazine is here so enjoy the read!

  • MC Press Magazine July 2017 Issue

    mc press magazine click to read the 2017 07 issueThe late, great David Bowie came to mind as I thought about the topic for this column. Turn and face the strange.

    The inadvertent theme of this month’s issue of MC Press Magazine has revealed itself to be changes.

    For starters, you may have noticed that the MC Press Online website underwent a total remodel in July. Positive comments from readers indicate that they’re pleased with the new look and functionality. If you haven’t looked at it yet, I encourage you to do so. The email format of our newsletters has been updated, too. And, of course, we have here the third issue of MC Press Magazine. Everything about the look and feel of MC Press Online is nice and fresh and bright now.

    Enjoy the read!

  • MC Press Magazine Aug 2017 Issue

    mc press magazine click to read the 2017 08 issue“Analysis” is arguably the tech buzzword of the day for businesses.

    Summer’s over. Everyone who is still in school has gone back to focusing on their studies. If you have kids in college, they may be taking some analytics classes—maybe topics about data mining, predictive modeling, data visualization, or business statistics.

    A quick search of available college classes turned up course titles such as Machine Learning and Optimization in Analytics, Social Network Analytics, Web Analytics, Data Management and Visualization in Analytics, and Computational Techniques for Large Scale Data Analysis.

    Does any of this sound familiar to you?

    If you’re racking your brain to think back to your own college days, you’re trying too hard. What I’m talking about should come up easily in recent memory. Think “Watson.”

    All of those course titles represent things a Watson app or service can do for you. You don’t have to spend a whole semester learning how to do it yourself.

    Enjoy the read.

  • MC Press Magazine Sept 2017 Issue

    mc press magazine click to read the 2017 09 issueLots of people love this time of year…for one reason or another.

    It’s autumn! Although I now live in the Southwest, I have nostalgic memories of the Northeast autumns of my youth. There is nothing (to me) as breathtakingly amazing as the beauty of trees’ leaves turning crimson, gold, and orange.

    Many people enjoy the spectacle of autumn foliage, but many, many more get excited about this season for a completely different reason: It’s football season.

    Let’s watch a fantasy football game.

    The MC Presstige is suited up, but instead of being on the gridiron, this all-star team is playing between the front and back covers of MC Press Magazine.

    The Presstige wins the toss. Game on!

  • MC Press Magazine Oct 2017 Issue

    mc press magazine click to read the 2017 10 issueGhosts and witches—they’re kid stuff. But there really are other things to be afraid of.

    By Victoria Mack

    This being October, Steve Pitcher has a bit of a Halloween scare for you. But this goblin isn’t a fantasy. It’s real. IBM has announced end of support for the exceptionally popular POWER7 machines. Will IBM offer extended hardware maintenance? Who knows? It hasn’t happened yet. Read Steve’s article to see his perceptions of what some may consider a truly horrifying announcement.

    If news of the Equifax breach left you quivering with fear, you’re not alone. Many, many people are wondering if they were affected. More importantly, many more are wondering how such a thing could have happened. News sources reported that a database hack was conducted on a “legacy” environment. Hmmm…legacy. You’ve heard that word used to describe the IBM i. Could it have been an IBM i that was hacked? Maybe. Carol Woodbury comments on that possibility and discusses the multiple layers of defense that are available to IBM i sys admins to ensure security breaches don’t happen to their company.

    But there’s more good news than bad news in this issue of MC Press Magazine.

LATEST COMMENTS