Category Archives: IBM i Security
A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading
Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading
Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks? Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack. … Continue reading
From the title you might be thinking that the theme of this article is something like “information security is war.” But that’s not it.
The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.
Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?
OR….. How Jobs Get Authority to Objects Words have consequences. Saying things like “we’re going to tighten security” or “we’re going to remove public (or default) authority” or “we’re going to remove direct access to data” will almost invariably lead … Continue reading
Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.
OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading
Recently I’ve written several blog posts about biometric authentication in IT Shops (see “Target Attack Leads to Discussion of Biometric Authentication“, “IT Shop Requirements for Exploiting Biometrics“, “Biometrics and SSO“). This post discusses a couple of secondary factors.