Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
To protect against the risk of a data breach—and the chance of failing a PCI or SOX audit—you need to ensure privileged users can't abuse their access. This exclusive guide shows you how.
In this short video, Tom Huntington, Executive Vice President of Technical Solutions, provides a comprehensive tour of Insite.
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
New York's law applies to more organizations than you might expect. This guide is designed to explain what the law means for IT professionals everywhere and how it is likely to influence future privacy regulations.
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Protecting sensitive corporate information and meeting compliance requirements aren’t the only reasons your organization needs a security policy. A well-defined policy can make the difference between maintaining the trust of customers, vendors, and employees—or facing the damaging consequences of a data breach.
Meeting government and industry compliance requirements is one of the top challenges faced by IT professionals. This guide is designed to help you make sense of the Health Insurance Portability and Accountability Act (HIPAA), which is one of today’s most common compliance mandates.
The goal of SOX is to hold companies accountable for corporate financial reporting and governance, and IT's involvement is vital. This guide is designed to help you make sense of Sarbanes-Oxley (SOX).
IT personnel naturally have their fingers on the pulse of today's innovations and one eye fixed on the future. As a result, each rising generation of systems administrators and application developers seems convinced...
Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to adequately secure critical data stored in IT systems .
Organizations around the world are implementing a...
Resetting a password is generally just a small annoyance, but IBM i password resets cost your organization significant amounts of time and money. Keep reading to learn about a solution that can reduce these costs—with no green screen access required!
This fall marked the 10th anniversary of the Payment Card Industry’s Data Security Standard. But are some merchants getting left behind?
This white paper examines how the Payment Card Industry Data Security Standard (PCI DSS) relates to IBM i servers and highlights when the Powertech products can provide a solution to specific PCI requirements.
I often speak to organizations whose sole focus is on achieving compliance. Sadly, they're overlooking the fact that there's a big difference between being secure and being compliant .
It's a good idea to give your systems a thorough self-audit, but knowing what to check and how to be as sure as possible that things are okay can be a moving target.
In this ebook, you’ll get a jumpstart and walk through some of the checks to go through to self-audit a Linux server’s security.
When 65 percent of the cost of a data breach is due to lost business, securing systems and meeting compliance requirements are vital initiatives for organizations of any size. This paper provides an overview of auditing an IBM Power Systems™ server running IBM i, using Powertech Security Scan.