Tag Archives: information security management

— A Developer’s Guide to Security Considerations for Modernization Projects — The number of IBM i applications that have been around for decades is truly amazing. It’s a testimony to the technology and vision IBM built into the platform. But … Continue reading

Posted in Info Security Mgmt | Tagged , , , | Leave a comment

While my kids were growing up I always told them that there was nothing more valuable than an education. As they were entering college just a couple of years ago, I was reminded that earning a graduate degree was an … Continue reading

Posted in Announcement, Info Security Mgmt | Tagged , , , | Leave a comment

Recently, I was talking to a system administrator who said “We’re moving to the cloud. They’ll be responsible for security.” I was a bit startled to hear this. Not because of the first sentence; because of the second.

Posted in Cloud Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Back in the ‘80s, President Reagan said of a missile treaty with the Soviet Union, “Trust, but Verify.” That phrase is very apt for information security too; especially as it relates to securing data on your internal systems.

Posted in IBM i Security, Info Security Mgmt, User Authority | Tagged , , , , | Leave a comment

I and other security experts have been harping for years on the fact that managing information security is so much more than just choosing the value of a configuration parameter. Information security requires an ongoing business process. It must be … Continue reading

Posted in Announcement, Compliance, Info Security Mgmt | Tagged , , , | Leave a comment

We will soon officially announce a new set of services called TeamSecurity. What are these services, you may ask? They are a collection of three service levels whereby the Botz team partners with your IT team to varying degrees to … Continue reading

Posted in Announcement, Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

Or… Why Your Mid-Sized Business is Suddenly Facing BIG Security Risks An interesting thing is happening in IT security.

Posted in Info Security Mgmt, Security Breach | Tagged , , , , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading

Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

In the latest version of her well-known IBM i security reference, IBM i Security Administration and Compliance, Carol Woodbury hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader … Continue reading

Posted in Announcement, IBM i Security | Tagged , , , , , | Leave a comment

OR… How to Recognize the Threat in the Seedling You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment