Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
The importance of monitoring your computer system and personal information simply cannot be overstated. In today's online environment, hackers hungry for users' account information and other sensitive details seem to be lurking around every corner. To keep these attackers at bay, companies must always have an eye on system and account activity, and be able to react quickly should anything...
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.
Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Many Power Systems users still believe Linux, AIX, and IBM i are immune to viruses because viruses are a Windows threat. That’s not the case in today’s connected environments.
A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
The bring-your-own-device trend has made significant waves in both the private and public sectors as workers increasingly rely on their own devices to handle their unique needs.
The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Though methods vary between companies, the counterintuitive truth is that managers may have to be more transparent with their motives in order to accomplish the oversight they want.
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.