Author Archives: Patrick Botz

OR… How to Recognize the Threat in the Seedling You regularly read news of security breaches, right? So why are all these businesses – large and small – getting hacked, cracked, and/or extorted by ransomware?

Posted in IBM i Security, Info Security Mgmt, Security Breach | Tagged , , , | Leave a comment

At the end of April, the Payment Card Industry (PCI) Security Standards Council released version 3.2 of the PCI Data Security Standard (DSS).  A couple changes are noteworthy, even though most were incremental or for clarification purposes.

Posted in Compliance, Two Factor Authentication | Tagged , , , , | Leave a comment

You may have heard that IBM included an interesting new security-related enhancement in the V7.3 release. Called authority collection, it provides information intended to help security administrators minimize the amount of authority to objects granted to users on a system.

Posted in Announcement, IBM i Security, User Authority | Tagged , , , , , , | Leave a comment

Verizon’s “Data breach digest. Scenarios from the field.” document includes a description of a successful attack on a water utility running on an “AS/400” (a.k.a. IBM i.)  It describes how a suspected Syrian “hacktivist” group broke into an IBM i … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , | Leave a comment

Lately I’ve found myself wondering…. does the FBI really need Apple’s help to decrypt a bad guy’s iPhone? Something seems fishy about the dust up between the FBI and Apple over the encrypted iPhone previously used by one of the … Continue reading

Posted in IBM i Security, Security Breach | Tagged , , , , , | Leave a comment

I recently had the opportunity to help a customer implement a web services interface that relied on SAML for authentication. Doing so provided a couple of insights that I found interesting.

Posted in Authentication | Tagged , , , , , | Leave a comment

We’ve been hearing about Windows Server 2016 for a while now. It’s time to see what Microsoft is doing with respect to Active Directory Domain Services (AD DS) and authentication enhancements.

Posted in Announcement, Single Sign-On (SSO) | Tagged , , , | Leave a comment

Recently I described a process that I use with customers to help them make decisions about where to spend their money allocated to information security. That post explained how to identify projects, but it didn’t address how to prioritize those … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , , | Leave a comment

Single sign-on (SSO) implementations tend to be very stable — unless you make specific system changes without planning ahead. Over the years, I’ve seen a handful problems occur more often than any others.  None of the problems are complicated or … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , | Leave a comment

We all know about special authorities, right? Defined by the IBM i operating system, they include *ALLOBJ, *AUDIT, *JOBCTL, *IOSYSCFG, *SAVSYS, *SERVICE, *SECADM and *SPLCTL. A few months ago I wrote about a set of IBM i APIs and commands … Continue reading

Posted in IBM i Security | Tagged , , , , | Leave a comment