Category Archives: User Authority

Back in the ‘80s, President Reagan said of a missile treaty with the Soviet Union, “Trust, but Verify.” That phrase is very apt for information security too; especially as it relates to securing data on your internal systems.

Posted in IBM i Security, Info Security Mgmt, User Authority | Tagged , , , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading

Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

You may have heard that IBM included an interesting new security-related enhancement in the V7.3 release. Called authority collection, it provides information intended to help security administrators minimize the amount of authority to objects granted to users on a system.

Posted in Announcement, IBM i Security, User Authority | Tagged , , , , , , | Leave a comment