Monthly Archives: May 2014
Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?
Posted in Announcement, Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security
Tagged AS/400, cloud security, compliance, cybersecurity, data security, IBM i 7.2, IBM i Security, IBM i V7R2, IBMi, info security management, Information Security, information security management, V7R2
Leave a comment
OR….. How Jobs Get Authority to Objects Words have consequences. Saying things like “we’re going to tighten security” or “we’re going to remove public (or default) authority” or “we’re going to remove direct access to data” will almost invariably lead … Continue reading
Posted in Botz Blog, IBM i Security, Info Security Mgmt, Information Security, Mobile Security
Tagged AS/400, cloud security, cybersecurity, data security, IBM i Security, IBMi, info security management, Information Security, information security management, security management, security policy
Leave a comment