Monthly Archives: July 2012

I find the “Krebs on Security” blog often has incredibly interesting stories. Here’s one that discusses how the author was the target of a hack that was used to help sell a distributed denial of service (DDoS) “service.”

Posted in Information Security | Tagged , , , | Leave a comment

Here’s an article from Power IT Pro that discusses a bit about using Kerberos in the AIX environment. With a few more configuration steps on Windows Active Directory, you can integrate AIX into Windows domain authentication also.

Posted in Single Sign-On (SSO) | Tagged , | Leave a comment

Ever wish you could access detailed documentation on enhancements delivered for IBM i via PTF? Here’s some information from IBM pointing to resources that I have found useful in learning about new security enhancements.

Posted in IBM i Security | Tagged , , | Leave a comment

Several years ago, I wrote an article for IBM i customers detailing the security questions they should ask their software vendors before buying — or at least before paying. Well, Michael Hickins, an editor for the Wall Street Journal recently … Continue reading

Posted in Information Security | Leave a comment

Josette Rigsby at MidsizeInsider.com recently posted a blog article called Five Signs Your Cloud Computing Security Is Out of Control.

Posted in Info Security Mgmt | Tagged , , , | Leave a comment