Tag Archives: cybersecurity

— A Developer’s Guide to Security Considerations for Modernization Projects — The number of IBM i applications that have been around for decades is truly amazing. It’s a testimony to the technology and vision IBM built into the platform. But … Continue reading

Posted in Info Security Mgmt | Tagged , , , | Leave a comment

While my kids were growing up I always told them that there was nothing more valuable than an education. As they were entering college just a couple of years ago, I was reminded that earning a graduate degree was an … Continue reading

Posted in Announcement, Info Security Mgmt | Tagged , , , | Leave a comment

— Take Steps to Protect Your Systems Until Then — The ubiquitous, hardware-related Spectre and Meltdown security flaws surprised many in the IBM i community. Who would have thought that the IBM i platform is just as susceptible to these … Continue reading

Posted in IBM i Security, Security Breach | Tagged , , , | Leave a comment

Recently, I was talking to a system administrator who said “We’re moving to the cloud. They’ll be responsible for security.” I was a bit startled to hear this. Not because of the first sentence; because of the second.

Posted in Cloud Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Believe it or not, some commonly-accepted password best practices are probably counter-productive for security in the real world.

Posted in Authentication, Password Management | Tagged , , , , , | Leave a comment

We will soon officially announce a new set of services called TeamSecurity. What are these services, you may ask? They are a collection of three service levels whereby the Botz team partners with your IT team to varying degrees to … Continue reading

Posted in Announcement, Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

Or… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks An interesting thing is happening in IT security.

Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

It’s that time of year again. Budgeting for next year means that you need to figure out how much you’re going to spend on security projects and products.  Of course, in order to determine how much money you need to … Continue reading

Posted in Info Security Mgmt, Information Security, Security Breach | Tagged , , , , , , , , , , | Leave a comment

CAUTION: RANT ALERT On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement. He said that China and one or two other countries have the capability to launch a cyber attack that could … Continue reading

Posted in Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , | Leave a comment

Whenever I see a web site or hear a commercial touting how my personal information is secure because “we use encryption,” I just have to chuckle. I guarantee you that Target did — and does — encrypt your personal information … Continue reading

Posted in Encryption, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , | 2 Comments