Sign up for the Botz Security Bytes newsletter!
Categories
- Announcement (10)
- Authentication (3)
- Biometrics (7)
- Botz Blog (25)
- Cloud Security (10)
- Compliance (11)
- Encryption (8)
- High Availability (3)
- IBM i Security (51)
- Info Security Mgmt (52)
- Information Security (43)
- Mobile Security (13)
- Password Management (4)
- Security Breach (7)
- Single Sign-On (SSO) (34)
- Social Engineering (4)
- Two Factor Authentication (2)
- Uncategorized (1)
- User Authority (2)
Category Archives: User Authority
The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading
You may have heard that IBM included an interesting new security-related enhancement in the V7.3 release. Called authority collection, it provides information intended to help security administrators minimize the amount of authority to objects granted to users on a system.