[[{“value”:”I had the privilege of hosting security expert Carol Woodbury as she led a roundtable discussion at this past summer’s OCEAN TechCon. Carol is IBM i Security SME and Senior Advisor with our friends at Kisco Systems. Several of Carol’s observations made a strong impression on both me and our CIO guests. Here are just a few. Security is a Lifestyle “Security is a lifestyle, not a one-time event.” Security requires regular evaluation and change over time. Without it, security settings degrade and new threats remain unaddressed Data Sprawl A term first mentioned at the conference by IBM’s Scott Forstie,…
The post Carol Woodbury’s Security Advice from CIO Summit at OCEAN 2024 appeared first on Seiden Group.”}]] Read More
Security Bulletin: Vulnerability in MD5 Signature and Hash Algorithm affects IBM i (CVE-2015-7575).
The MD5 “SLOTH” vulnerability on TLS 1.2 affects IBM i. Read More
Fall 2024 TRs announced [email protected] (Simon Hutchinson)
[[{“value”:”The Fall Technology Refreshes for IBM i 7.5, TR5, and 7.4, TR11, were announced this morning.
Having a quick glance at the announcement documentation from IBM it would appear that the two have the identical changes:
Db2 of i (SQL)
14 enhancements
9 new additions
RPG
3 new additions
Read more »”}]] Read More
Cyber Security & Foundations for a More Secure IBM i Joe Whitehurst
[[{“value”:”Cyber Security on the IBM i – It’s not easy, but it doesn’t have to be hard. With Cyber Security being the top concern for IBM i professionals for the sixth year running, Andy Nicholson talks through some foundations you can build for better Cyber Security on your IBM i (AS40/ iSeries) systems. And below
The post Cyber Security & Foundations for a More Secure IBM i appeared first on Proximity.”}]] Read More
File Operations Opcode Session Programmers IO
Teaching IBM Power skills in a free online IBM i Internship Program for university students and IT professionals around the world. Read More