Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
Blog
Encrypting IBM i Sessions in Access Client Solutions (ACS)
Tue, 09/17/2019
Fortra security expert explains how & why you should encrypt IBM i sessions using SSL (TLS) in Access Client Solutions (ACS).
Blog
Top 3 New Security Features in IBM i V7R4
Tue, 05/28/2019
IBM recently announced the release of V7R4, which brings some new integrated security features you'll want to take advantage of.
Blog
IBM i Exit Points: What They Are and When to Use Them
Thu, 05/16/2019
Fortra security expert explains the concept of exit programs and provides examples of how they can be used to customize your IBM i administration.
Blog
12 Skills Every Security Administrator Needs for Success (and How to Learn Them)
By Robin Tatam on Sat, 03/09/2019
Mastering these 12 skills can make a security administrator a powerful weapon against data breaches.
Blog
35 Cybersecurity Risks for IBM i Administrators and How to Thwart Them
By Robin Tatam on Wed, 02/27/2019
Here’s a rundown of commonly overlooked IBM i cybersecurity risks and how to make sure they don’t open your business up to a disastrous situation.
Blog
Avoid an IBM i Cyber Attack: 6 Things to Check Regularly
By Robin Tatam on Wed, 01/09/2019
If you don’t want to make headlines with the next major data breach, here are six things to check regularly on IBM i.
Blog
How IBM i Users Can Gain Untraceable Access To Your Company’s Private Data
By Robin Tatam on Thu, 01/03/2019
Robin Tatam explains how some services that facilitate data access to IBM i bypass traditional security controls—and give your users unmonitored and unrestricted access to sensitive data.
Blog
3 Ways Malware Can Reach Your IFS
Thu, 12/13/2018
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog
A Simple Way to Enforce Password Best Practices on IBM i
Tue, 10/16/2018
Password guidelines have changed. Learn how the new rules affect IBM i and find out how a simple tool can make it easier to enforce a strong IBM i password policy at your organization.
Blog
Your IFS Is Probably a Treasure Trove of Unsecured Data
Wed, 09/12/2018
Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By Robin Tatam on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
Blog
Hacker Horror Stories: The Scary World of Cybercrime
By Robin Tatam on Fri, 03/24/2017
In our technologically advanced world, few things are scarier than the possibility of devices and systems being hacked by cybercriminals.
Blog
Compare Powertech Encryption for IBM i to IBM's Cryptographic APIs for Encrypting Database Fields
By Bob Luebbe on Fri, 03/17/2017
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Blog
Protect Your Administrator Accounts from Abuse
Fri, 03/10/2017
Attackers often use malware to exploit user credentials and gain access to sensitive data. Properly securing admin accounts is an important line of defense you don't want to ignore. Read on to learn how.