Tag Archives: data security

— A Developer’s Guide to Security Considerations for Modernization Projects — The number of IBM i applications that have been around for decades is truly amazing. It’s a testimony to the technology and vision IBM built into the platform. But … Continue reading

Posted in Info Security Mgmt | Tagged , , , | Leave a comment

While my kids were growing up I always told them that there was nothing more valuable than an education. As they were entering college just a couple of years ago, I was reminded that earning a graduate degree was an … Continue reading

Posted in Announcement, Info Security Mgmt | Tagged , , , | Leave a comment

— Take Steps to Protect Your Systems Until Then — The ubiquitous, hardware-related Spectre and Meltdown security flaws surprised many in the IBM i community. Who would have thought that the IBM i platform is just as susceptible to these … Continue reading

Posted in IBM i Security, Security Breach | Tagged , , , | Leave a comment

Recently, I was talking to a system administrator who said “We’re moving to the cloud. They’ll be responsible for security.” I was a bit startled to hear this. Not because of the first sentence; because of the second.

Posted in Cloud Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Back in the ‘80s, President Reagan said of a missile treaty with the Soviet Union, “Trust, but Verify.” That phrase is very apt for information security too; especially as it relates to securing data on your internal systems.

Posted in IBM i Security, Info Security Mgmt, User Authority | Tagged , , , , | Leave a comment

I thought it would be interesting for my first Security Bytes post of 2107 to pull together the most popular posts from 2016 based on number of readers. As an added attraction, I’ve also included the most popular post in … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Or… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks An interesting thing is happening in IT security.

Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading

Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

OR… How to Recognize the Threat in the Seedling You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment

At the end of April, the Payment Card Industry (PCI) Security Standards Council released version 3.2 of the PCI Data Security Standard (DSS).  A couple changes are noteworthy, even though most were incremental or for clarification purposes.

Posted in Compliance, Two Factor Authentication | Tagged , , , , | Leave a comment