12
Sun, May
1 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
19 June 2015 The Benefits of a Strong Security Implementation…Beyond Security IBM i (OS/400, i5/OS) | Security 3,484
15 May 2015 Tips for Preparing for an IBM i Audit IBM i (OS/400, i5/OS) | Security 4,020
17 April 2015 True or False: A Pop Quiz on IBM i Security Facts IBM i (OS/400, i5/OS) | Security 4,741
20 March 2015 IFS for IBM i in Review IBM i (OS/400, i5/OS) | Security 5,437
20 February 2015 Group Profiles in Review IBM i (OS/400, i5/OS) | Security 4,288
23 January 2015 Start Thinking About Security in New Ways Compliance / Privacy | Security 4,111
19 December 2014 Carol's Favorite (IBM i and Other) Things IBM i (OS/400, i5/OS) | Security 4,674
21 November 2014 Protecting Your Passwords on IBM i IBM i (OS/400, i5/OS) | Security 5,031
17 October 2014 Who's More Dangerous? The Person You Know or the Person You Don't Know? Security - Other | Security 3,846
19 September 2014 Adopted Authority: Friend or Foe? IBM i (OS/400, i5/OS) | Security 5,680
15 August 2014 Security Patrol: The Hidden Dangers of Shadow IT Security - Other | Security 4,627
18 July 2014 Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls IBM i (OS/400, i5/OS) | Security 7,674
14 July 2014 Before Moving to the Cloud, Get Your Rain Gear On Security - Other | Security 4,024
20 June 2014 Security Patrol: V7R2 Security Enhancements, Part 1 IBM i (OS/400, i5/OS) | Security 7,325
16 May 2014 Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? IBM i (OS/400, i5/OS) | Security 11,280
18 April 2014 Security Patrol: Detecting a Breach IBM i (OS/400, i5/OS) | Security 4,492
21 March 2014 Security Patrol: Pretend You've Been Hacked Security - Other | Security 3,778
24 February 2014 Virus Got You Down? IBM i (OS/400, i5/OS) | Security 4,263
10 February 2014 PCI and What It Means to IBM i IBM i (OS/400, i5/OS) | Security 3,827
10 June 2013 Top Ten Security Considerations for the Cloud Compliance / Privacy | Security 4,469
13 May 2013 Top Ten New Features of IBM i Security IBM i (OS/400, i5/OS) | Security 4,506
11 March 2013 5 Ways to Control Access using Application Administration IBM i (OS/400, i5/OS) | Security 4,345
26 November 2012 5 Steps for Implementing Role-Based Access on the IBM i IBM i (OS/400, i5/OS) | Security 4,113
13 June 2012 Securing Your Printed Output IBM i (OS/400, i5/OS) | Security 5,194
11 June 2012 Protecting Your Data: How Much Security Is Enough? Compliance / Privacy | Security 3,903
23 May 2012 Common Questions You Have About AIX Security but Were Afraid to Ask UNIX / AIX | Operating Systems | IT Infrastructure 13,420
23 April 2012 Security Considerations for the Cloud Compliance / Privacy | Security 3,909
08 August 2011 Security and the Cloud: Blue Skies or a Major Storm? Compliance / Privacy | Security 4,638
13 June 2011 What Authorities Do Programmers Really Need? IBM i (OS/400, i5/OS) | Security 5,511
09 May 2011 You Don't Trust Me Anymore! Compliance / Privacy | Security 38,037
28 February 2011 Ways to Use the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 8,734
25 October 2010 What's Hot and What's Not in the World of Security Technology Security - Other | Security 5,908
11 October 2010 Getting a Jump Start on Your Impending Audit! IBM i (OS/400, i5/OS) | Security 4,836
08 September 2010 Does Privacy Assure Compliance? Compliance / Privacy | Security 6,029
09 August 2010 Security Considerations for the Cloud Security - Other | Security 5,154
24 May 2010 Does Compliance Guarantee Privacy? Compliance / Privacy | Security 5,768
14 April 2010 Sneak Peek of the New Security Features in V7 IBM i (OS/400, i5/OS) | Security 7,163
25 January 2010 Do You Understand the Foundations Behind Today's Compliance Laws and Regulations? Compliance / Privacy | Security 6,498
26 October 2009 Partner TechTip: Setting Authority Is Not a One-Time Event Security - Other | Security 5,993
26 August 2009 Partner TechTip: Do "Sensitive" Commands Need Extra Security? Security - Other | Security 6,339
22 June 2009 Partner TechTip: Why Should You Care What Happens in Massachusetts? Security - Other | Security 5,460
05 April 2009 SkyView Risk Assessor Now Includes PCI-Specific Considerations Compliance / Privacy | Security News | News 5,583
22 March 2009 Compliance Without the Complexities Security - Other | Security 6,694
11 February 2009 Employing Best Practices for IBM i Security IBM i (OS/400, i5/OS) | Security 8,137
11 February 2009 Partner TechTip: Let's Review! Security - Other | Security 5,974
19 December 2008 Partner TechTip: Five Tips for Protecting Your Organization Security - Other | Security 5,394
14 November 2008 Partner TechTip: Don't Forget These User Profile Attributes Security - Other | Security 6,734
17 October 2008 Partner TechTip: How Do You Ensure Data Integrity? Security - Other | Security 6,413
19 September 2008 Partner TechTip: Answers to Your Burning i5/OS Auditing Questions Security - Other | Security 6,327
20 June 2008 Partner TechTip: Utilizing the QUSEADPAUT System Value Security - Other | Security 6,979
Carol Woodbury

 

Carol Woodbury is President and CTO of DXR Security and has over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies – SkyView Partners and DXR Security. Her current company - DXR Security - specializes in penetration testing for IBM i. Her practical experience together with her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known world-wide as an author and award-winning speaker on security technology, specializing in IBM i Security topics. She has written seven books on IBM i Security. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.

 


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance: Second Edition IBM i Security Administration and Compliance: Second Edition
Get the must-have guide by the industry’s #1 security authority.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance IBM i Security Administration and Compliance
For beginners to veterans, this is the definitive security resource.
List Price $69.95

Now On Sale