Tag Archives: compliance

CAUTION: RANT ALERT On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement. He said that China and one or two other countries have the capability to launch a cyber attack that could … Continue reading

Posted in Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , | Leave a comment

A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading

Posted in Botz Blog, Cloud Security, Compliance, Encryption, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , , | 2 Comments

  Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , , | Leave a comment

From the title you might be thinking that the theme of this article is something like “information security is war.” But that’s not it.

Posted in IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , | Leave a comment

Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?

Posted in Announcement, Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , | Leave a comment

Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up,  the potential cost to Target during the … Continue reading

Posted in Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , , | 1 Comment

A while ago I ran across this white paper from KPMG Netherlands: The five most common cyber security mistakes: Management’s perspective on cyber security.  As I was reading it I found myself making my own list. My list is called “5 … Continue reading

Posted in Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , | 2 Comments

I recently collaborated with Patrick Townsend, CTO Townsend Security, on an encryption key management white paper.  The paper is targeted at the IBM i audience but actually contains useful information for folks using any platform.

Posted in Botz Blog, Compliance, Encryption, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , | Leave a comment

This from a LinkedIn group post published on SecurityInfoWatch.com: “In the ever evolving threat landscape that is IT security, some security executives have become so focused on taking an approach that meets compliance requirements that their attention has become diverted … Continue reading

Posted in Compliance, Info Security Mgmt | Tagged , | Leave a comment