Monthly Archives: April 2013

“Former Hostgator employee arrested, charged with rooting 2,700 servers” was the headline of an April 19, 2013 article published by Ars Technica website. ┬áRooting refers to providing the attacker a way to gain superuser access on a computer system. Doing … Continue reading

Posted in Cloud Security, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , | Leave a comment

This from a LinkedIn group post published on SecurityInfoWatch.com: “In the ever evolving threat landscape that is IT security, some security executives have become so focused on taking an approach that meets compliance requirements that their attention has become diverted … Continue reading

Posted in Compliance, Info Security Mgmt | Tagged , | Leave a comment

How many times have you heard someone say “Nobody would want to attack my computer.”? ┬áI’ve heard it too many times to count. I even hear it from some of the businesses I work with. Well Brian Krebs, author of … Continue reading

Posted in Info Security Mgmt, Information Security, Social Engineering | Tagged , , , , , | Leave a comment

Recently I did a Google search for Kerberos-related problems on V7R1 for IBM i. The results should be useful for lots of IBM i customers using SSO. The first one, SI43918, is in a CUM package. However, some of the … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , | Leave a comment