Tag Archives: Information Security

It’s that time of year again. Budgeting for next year means that you need to figure out how much you’re going to spend on security projects and products.  Of course, in order to determine how much money you need to … Continue reading

Posted in Info Security Mgmt, Information Security, Security Breach | Tagged , , , , , , , , , , | Leave a comment

  One of the things I like best about my job is that I get to see a lot of different environments using many different parts of the operating system.  This often gives me the opportunity to learn something new.

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment

It may surprise a few people, but I’m just not worried about my credit card being stolen. In fact, I refuse to worry about it. That may sound like heresy for someone who is supposed to know a little bit … Continue reading

Posted in Botz Blog, Cloud Security, Info Security Mgmt, Information Security, Mobile Security, Security Breach | Tagged , , , , , | Leave a comment

In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue.  I asserted that there are three different aspects that … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , | 1 Comment

I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , | Leave a comment

A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading

Posted in Botz Blog, Cloud Security, Compliance, Encryption, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , , | 2 Comments

Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks?  Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack.  … Continue reading

Posted in Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Social Engineering | Tagged , , , , , , , , , , , , | Leave a comment

Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?

Posted in Announcement, Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , | Leave a comment

OR….. How Jobs Get Authority to Objects Words have consequences. Saying things like “we’re going to tighten security” or “we’re going to remove public (or default) authority” or “we’re going to remove direct access to data” will almost invariably lead … Continue reading

Posted in Botz Blog, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , | Leave a comment

In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading

Posted in Biometrics, Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , , , , , , , , | 1 Comment