Blog
Why Workload Automation is Critical in the Cloud Era
Tue, 03/14/2017
Cloud applications are transforming IT environments. Find out how workload automation fits into the picture.
Blog
Does Your Business Belong in the Cloud?
Tue, 03/14/2017
The cloud is all about access. It’s about getting access on-demand, access to resources needed for your growing demands, and controlling who has access to your information. Everybody is talking about it, but is the cloud the right answer for your business needs? And if so, which one?
Blog
Automation is Key to Staying in the Driver’s Seat of your Data-Driven Strategy
By Dan Twing on Tue, 03/14/2017
In this guest post, EMA's Dan Twing discusses the data management challenges facing enterprises today and how automation software can help.
Blog
What Does GDPR Mean to an IT Manager, CTO, or Systems Admin?
By Donnie MacColl on Fri, 03/10/2017
GDPR will affect Chief Technology Officers to System Admins and all levels of seniority in between. By preparing for GDPR now, you can anticipate its effects instead of being surprised.
Blog
Building a Better Virus Trap
By Sandi Moore on Fri, 03/10/2017
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog
Protect Your Administrator Accounts from Abuse
Fri, 03/10/2017
Attackers often use malware to exploit user credentials and gain access to sensitive data. Properly securing admin accounts is an important line of defense you don't want to ignore. Read on to learn how.
Blog
A Virus on i?
By Sandi Moore on Thu, 03/09/2017
Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog
4 Reasons You Need Native Virus Scanning
By Robin Tatam on Thu, 03/09/2017
Many Power Systems users still believe Linux, AIX, and IBM i are immune to viruses because viruses are a Windows threat. That’s not the case in today’s connected environments.
Blog
Advanced Malware and Your Power Systems Server
Thu, 03/09/2017
When it comes to advanced malware, there is no way to learn from past mistakes. There is only prevention. Learn how with Powertech Antivirus.
Blog
Three IFS Security Weaknesses You Must Secure Now
By Robin Tatam on Thu, 03/09/2017
The Integrated File System (IFS) is one of the most ignored parts of the system, yet it makes possible many of the most powerful and most used features on IBM i servers today.
Blog
The DDoS Deception You Need to Know About
By Robin Tatam on Wed, 03/08/2017
A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog
BYOD: Problems, Practices, and Solutions
By Robin Tatam on Wed, 03/08/2017
The bring-your-own-device trend has made significant waves in both the private and public sectors as workers increasingly rely on their own devices to handle their unique needs.
Blog
PCI Compliance is Only the Beginning of Security
By Robin Tatam on Wed, 03/08/2017
The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog
PCI Compliance Takeaways from the Target Data Breach
By Robin Tatam on Wed, 03/08/2017
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog
What is the Value of SIEM?
By Robin Tatam on Wed, 03/08/2017
As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Blog
Finding the Balance: Personal Privacy vs. Corporate Protection
By Robin Tatam on Wed, 03/08/2017
Though methods vary between companies, the counterintuitive truth is that managers may have to be more transparent with their motives in order to accomplish the oversight they want.
Blog
What to Know about the New NIST Cybersecurity Framework
By Robin Tatam on Wed, 03/08/2017
Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Blog
3 Key Skills of a Successful Security Administrator
By Robin Tatam on Tue, 03/07/2017
The constantly changing cybercrime landscape paired with the speed of new technologies can make it difficult to know which skills a security administrator should focus on.