I and other security experts have been harping for years on the fact that managing information security is so much more than just choosing the value of a configuration parameter.

Information security requires an ongoing business process. It must be supported and championed by the highest levels of leadership in the organization and it must include identification of threats and vulnerabilities, plus the creation of written policies that are implemented effectively and efficiently and periodically reviewed.

Well, the state of New York is set to enact these “recommendations” into law for insurance companies and financial institutions.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Announcement, Compliance, Info Security Mgmt | Tagged , , , | Leave a comment

Believe it or not, some commonly-accepted password best practices are probably counter-productive for security in the real world.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Authentication, Password Management | Tagged , , , , , | Leave a comment

TeamSecurityWe will soon officially announce a new set of services called TeamSecurity.

What are these services, you may ask? They are a collection of three service levels whereby the Botz team partners with your IT team to varying degrees to help you manage your security at a much lower cost than hiring that expertise full time.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Announcement, Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

 by delfi de la RuaOr… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks

An interesting thing is happening in IT security.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

Townsend SecurityIf you want a good introduction to FIELDPROC encryption, Townsend Security just published an eBook that is a great tool for getting started.

IBM i Encryption with FieldProc: Protecting Data at Rest provides useful information about FIELDPROC exit point architecture and the kinds of features and limitations to look for in any FIELDPROC-based encryption product. Of course, there is marketing information interspersed but it is easily identifiable and, in my opinion, doesn’t detract from the information provided.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Encryption, Info Security Mgmt | Tagged , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments.

Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It occurred to me that humans don’t restrict their stupid tricks to entertaining each other. We employ them in nearly every aspect of our lives.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

A common web server setup with an uncommon SSO hiccup

Last week an SSO stat! customer called me needing some help. They had the Apache Web server on IBM i configured to use Kerberos authentication, and it had been working fine. They then introduced a load balancer… and they couldn’t get SSO to work with it!
Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Authentication, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

In the latest version of her well-known IBM i security reference, IBM i Security Administration and Compliance, Carol Woodbury hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader to fundamental concepts of information security management.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Announcement, IBM i Security | Tagged , , , , , | Leave a comment

OR… How to Recognize the Threat in the Seedling

You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment

At the end of April, the Payment Card Industry (PCI) Security Standards Council released version 3.2 of the PCI Data Security Standard (DSS).  A couple changes are noteworthy, even though most were incremental or for clarification purposes.

Continue reading

Facebooktwittergoogle_pluspinterestlinkedinmail
Posted in Compliance, Two Factor Authentication | Tagged , , , , | Leave a comment