Tag Archives: information security management

Recently, I was talking to a system administrator who said “We’re moving to the cloud. They’ll be responsible for security.” I was a bit startled to hear this. Not because of the first sentence; because of the second.

Posted in Cloud Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Back in the ‘80s, President Reagan said of a missile treaty with the Soviet Union, “Trust, but Verify.” That phrase is very apt for information security too; especially as it relates to securing data on your internal systems.

Posted in IBM i Security, Info Security Mgmt, User Authority | Tagged , , , , | Leave a comment

I and other security experts have been harping for years on the fact that managing information security is so much more than just choosing the value of a configuration parameter. Information security requires an ongoing business process. It must be … Continue reading

Posted in Announcement, Compliance, Info Security Mgmt | Tagged , , , | Leave a comment

We will soon officially announce a new set of services called TeamSecurity. What are these services, you may ask? They are a collection of three service levels whereby the Botz team partners with your IT team to varying degrees to … Continue reading

Posted in Announcement, Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

Or… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks An interesting thing is happening in IT security.

Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading

Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

In the latest version of her well-known IBM i security reference, IBM i Security Administration and Compliance, Carol Woodbury hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader … Continue reading

Posted in Announcement, IBM i Security | Tagged , , , , , | Leave a comment

OR… How to Recognize the Threat in the Seedling You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment

Verizon’s “Data breach digest. Scenarios from the field.” document includes a description of a successful attack on a water utility running on an “AS/400” (a.k.a. IBM i.)  It describes how a suspected Syrian “hacktivist” group broke into an IBM i … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , | Leave a comment

Lately I’ve found myself wondering…. does the FBI really need Apple’s help to decrypt a bad guy’s iPhone? Something seems fishy about the dust up between the FBI and Apple over the encrypted iPhone previously used by one of the … Continue reading

Posted in IBM i Security, Security Breach | Tagged , , , , , | Leave a comment