Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
When 65 percent of the cost of a data breach is due to lost business, securing systems and meeting compliance requirements are vital initiatives for organizations of any size. This paper provides an overview of auditing an IBM Power Systems™ server running IBM i, using Powertech Security Scan.
It's a good idea to give your systems a thorough self-audit, but knowing what to check and how to be as sure as possible that things are okay can be a moving target.
In this ebook, you’ll get a jumpstart and walk through some of the checks to go through to self-audit a Linux server’s security.
This white paper examines how the Payment Card Industry Data Security Standard (PCI DSS) relates to IBM i servers and highlights when the Powertech products can provide a solution to specific PCI requirements.
Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
Many organizations can now attest to the fact that proactively taking small steps to protect the technology infrastructure would have been far less costly than those implemented during the panic following a major breach.
Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to adequately secure critical data stored in IT systems .
Organizations around the world are implementing a...
Your own users are one of the greatest threats to your IBM i. Learn how to protect your system through effective identity and access management.
Meeting government and industry compliance requirements is one of the top challenges faced by IT professionals. This guide is designed to help you make sense of the Health Insurance Portability and Accountability Act (HIPAA), which is one of today’s most common compliance mandates.
The goal of SOX is to hold companies accountable for corporate financial reporting and governance, and IT's involvement is vital. This guide is designed to help you make sense of Sarbanes-Oxley (SOX).
The constantly changing cybercrime landscape paired with the speed of new technologies can make it difficult to know which skills a security administrator should focus on.
Protecting sensitive corporate information and meeting compliance requirements aren’t the only reasons your organization needs a security policy. A well-defined policy can make the difference between maintaining the trust of customers, vendors, and employees—or facing the damaging consequences of a data breach.
The PCI Security Standards Council is set to officially release its third iteration of PCI DSS in two days on November 7, and the new version features numerous changes.
Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
With so few companies satisfying—much less optimizing—their risk management responsibilities, it’s worth examining which obstacles may be impeding progress.
The word ‘audit’ is rarely welcomed with open arms by the IT department, and administrators often employ all sorts of delay and escape tactics to avoid the inevitable. But what they may not realize is the full significance of passing these assessments, or how painless the process can be.
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
This list of tips will help you prepare your organization for GDPR and minimize the risk of violations.
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.