Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
One of the (many) things that I find alarming in my line of work is the number of companies that expect to respond to a data breach without a solid and tested response plan.
Risks are present due to hackers, wayward or careless employees, bad configuration settings, and even failing hardware. Many security risks can be reduced with the same precautionary mindset as personal risk.
IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Users neglected the security void created by TCP/IP services for years, but exit programs can provide the robust solution today's threat environment demands.
While the exact causes of the plane’s demise have not been determined yet, security experts have taken the opportunity to point out that cyberattacks could exploit the features of advanced airliners and lead to similar incidents in the future.
Most of us can comprehend that hackers, thieves, and other nefarious individuals represent a constant threat to our business assets—including corporate data. Many don’t realize, however, that there’s a stealthier threat lurking.
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.
Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
Every day when a report is run or an inquiry is made in an application, the automatic assumption is that the underlying data is accurate and has not been tampered with. But how can you be...
If you’re not encouraging your IBM i security administrator to speak up, you may be missing critical issues. To help provide a voice to the staff responsible for security on Power Systems servers, this list offers five things that you may not have heard from your administrators, but should.
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Dating back to the days of its technological predecessor, the AS/400, the IBM Power Systems server and associated IBM i operating system have enjoyed an enviable reputation when combined...
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Mobile malware has been on the rise over the past few years as individuals and organizations shift more tasks from PCs to smartphones and tablets.
Release 7.2 of Powertech Antivirus includes the McAfee 5700 Anti-Malware Engine, giving you faster initialization and performance optimization for scanning as well as improved threat detection.
While the movie involved the coordinated theft of numerous hard-to-steal cars, a 2008 cybercrime is back in the news and giving it a run for its money.
As software and hardware security measures improve, hackers have to look for alternate methods to access the network. Have you done your due diligence to keep them out?
Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
Many organizations can now attest to the fact that proactively taking small steps to protect the technology infrastructure would have been far less costly than those implemented during the panic following a major breach.
Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority —have been assigned. In many cases, the excess...