Tag Archives: password management
Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading
I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading
In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue. I asserted that there are three different aspects that … Continue reading
Information security is first and foremost a business issue. As IT professionals, we need to analyze the merits of any security project based on how much the investment will benefit the organization.
So you’re interested in implementing single sign-on. You know that everybody, including management, will love it. But that doesn’t mean that management will give you a blank check to implement it. Like any security project, they expect you to make … Continue reading
Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading
Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks? Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack. … Continue reading
This tried and true newsletter contains many good articles as usual. Lots on the NSA, but take a look at “Choosing Secure Passwords.” Bruce Shneier always has a great point of view on anything security related!
Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up, the potential cost to Target during the … Continue reading
IBM DB2 Web Query for i is a replacement for the venerable Query/400 utility. It is used for generating business reports from data stored in DB2 databases on IBM i. It sports a browser-based interface and can generate formatted and … Continue reading