Category Archives: Info Security Mgmt

Recently, I was talking to a system administrator who said “We’re moving to the cloud. They’ll be responsible for security.” I was a bit startled to hear this. Not because of the first sentence; because of the second.

Posted in Cloud Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Back in the ‘80s, President Reagan said of a missile treaty with the Soviet Union, “Trust, but Verify.” That phrase is very apt for information security too; especially as it relates to securing data on your internal systems.

Posted in IBM i Security, Info Security Mgmt, User Authority | Tagged , , , , | Leave a comment

You may have noticed that I often recommend that folks just get started doing a little something to address information security. Don’t let everything else you should be doing get in the way of taking steps to secure your system. … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , | Leave a comment

Before you can advise management how much time and money you should spend on securing information assets, you should know what information assets you need to protect and how much they are worth to your company. If your organization doesn’t … Continue reading

Posted in Info Security Mgmt, Information Security, Security Breach | Tagged , , | Leave a comment

I and other security experts have been harping for years on the fact that managing information security is so much more than just choosing the value of a configuration parameter. Information security requires an ongoing business process. It must be … Continue reading

Posted in Announcement, Compliance, Info Security Mgmt | Tagged , , , | Leave a comment

We will soon officially announce a new set of services called TeamSecurity. What are these services, you may ask? They are a collection of three service levels whereby the Botz team partners with your IT team to varying degrees to … Continue reading

Posted in Announcement, Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

Or… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks An interesting thing is happening in IT security.

Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

If you want a good introduction to FIELDPROC encryption, Townsend Security just published an eBook that is a great tool for getting started. IBM i Encryption with FieldProc: Protecting Data at Rest provides useful information about FIELDPROC exit point architecture … Continue reading

Posted in Encryption, Info Security Mgmt | Tagged , , | Leave a comment

OR… How to Recognize the Threat in the Seedling You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment

Verizon’s “Data breach digest. Scenarios from the field.” document includes a description of a successful attack on a water utility running on an “AS/400” (a.k.a. IBM i.)  It describes how a suspected Syrian “hacktivist” group broke into an IBM i … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , | Leave a comment