13
Mon, May
1 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
28 March 2008 Partner TechTip: Changing QCRTAUT in i5/OS Security - Other | Security 5,365
24 March 2008 Will Moving to V6R1 Make Your System More Secure? IBM i (OS/400, i5/OS) | Security 8,618
13 February 2008 Understand How to Address Current Compliance Regulations Compliance / Privacy | Security 7,061
30 November 2007 Partner TechTip: Hidden Treasures Security - Other | Security 5,463
26 November 2007 Laws and Regulations Affecting Data Privacy Compliance / Privacy | Security 6,347
26 October 2007 Partner TechTip: Oh No! Another Audit! Security - Other | Security 5,286
28 September 2007 Partner TechTip: What's the Big Deal About File Shares? Security - Other | Security 5,284
06 September 2007 Partner TechTip: Secure Your System i with Special Authorities Security - Other | Security 4,164
13 August 2007 Building an Architecture to Ensure Compliance Throughout Your Organization Compliance / Privacy | Security 5,738
27 July 2007 Partner TechTip: SkyView Products Assist with PCI Compliance Security - Other | Security 5,209
23 July 2007 Building an Architecture for Regulatory Compliance Compliance / Privacy | Security 5,824
29 June 2007 Partner TechTip: Securing Queries Security - Other | Security 5,344
25 May 2007 Partner TechTip: Managing QSECOFR User Profiles Security - Other | Security 6,855
27 April 2007 Partner TechTip: Don't Forget These i5/OS User Profile Attributes Security - Other | Security 5,545
23 April 2007 Your Guide to a Successful Encryption Project IBM i (OS/400, i5/OS) | Security 20,661
30 March 2007 Partner TechTip: Are You Saving Your i5/OS Security Data? Security - Other | Security 5,592
12 March 2007 The Do's and Don'ts of Working with Auditors Compliance / Privacy | Security 28,459
23 February 2007 Partner TechTip: Managing the Authorities and Ownership of Stream Files Security - Other | Security 6,126
26 January 2007 Partner TechTip: Authorities to User Profiles Security - Other | Security 6,669
13 December 2006 Communicating Compliance Requirements Accurately Is Critical Compliance / Privacy | Security 5,090
23 August 2006 Programming for Compliance Compliance / Privacy | Security 5,310
02 August 2006 Considerations Before Purchasing Security-Related Internet Products IBM i (OS/400, i5/OS) | Security 5,386
19 June 2006 Evil Ones Lurking Analysis of News Events | Current Events & Commentary 3,577
19 December 2005 The Ten Most Significant Security Threats Facing IT Today IBM i (OS/400, i5/OS) | Security 7,543
02 December 2005 Partner TechTip: Manage and Monitor Your Security Security - Other | Security 4,127
04 November 2005 Partner TechTip: Keeping an Application's Security Scheme Intact Security - Other | Security 4,007
14 October 2005 Partner TechTip: Managing User Profiles for Security Compliance Security - Other | Security 4,295
20 December 2004 Security Patrol: What I Hope You've Learned IBM i (OS/400, i5/OS) | Security 5,332
15 November 2004 Security Patrol: Safely Providing "Emergency" Access IBM i (OS/400, i5/OS) | Security 5,298
18 October 2004 Security Patrol: Why Is Security Avoided? IBM i (OS/400, i5/OS) | Security 5,547
20 September 2004 Security Patrol: What's New in V5R3 IBM i (OS/400, i5/OS) | Security 10,097
16 August 2004 Security Patrol: Single Sign-On, Part 3 IBM i (OS/400, i5/OS) | Security 7,224
19 July 2004 Security Patrol: Single Sign-On, Part 2 IBM i (OS/400, i5/OS) | Security 7,800
21 June 2004 Security Patrol: Single Sign-On, Part 1 IBM i (OS/400, i5/OS) | Security 7,812
24 May 2004 Security Patrol: iSeries Navigator's Application Administration IBM i (OS/400, i5/OS) | Security 8,968
26 April 2004 Security Patrol: The Hidden Jewels of OS/400 Security IBM i (OS/400, i5/OS) | Security 6,921
22 March 2004 Security Patrol: WebSphere Application Server (WAS) 5.0 Security Primer IBM i (OS/400, i5/OS) | Security 9,682
23 February 2004 Security Patrol: Current OS/400 Security Issue Q&A IBM i (OS/400, i5/OS) | Security 5,150
26 January 2004 Security Patrol: What Does Security Have to Do with High Availability and Disaster Recovery? IBM i (OS/400, i5/OS) | Security 5,367
29 December 2003 Security Patrol: Characteristics of a Security Administrator IBM i (OS/400, i5/OS) | Security 5,219
24 November 2003 Security Patrol: The Things for Which I'm Thankful IBM i (OS/400, i5/OS) | Security 5,571
27 October 2003 Security Patrol: Is the Sarbanes-Oxley Act Security-Relevant or Not? Compliance / Privacy | Security 5,473
22 September 2003 Security Patrol: Securing Your Output IBM i (OS/400, i5/OS) | Security 7,523
25 August 2003 Security Patrol: Those Questions About User Profiles That You've Always Been Afraid to Ask IBM i (OS/400, i5/OS) | Security 12,548
28 July 2003 Security Patrol: Managing User Profiles With Management Central IBM i (OS/400, i5/OS) | Security 6,825
23 June 2003 Security Patrol: DDM and DRDA Running Over TCP/IP IBM i (OS/400, i5/OS) | Security 12,387
26 May 2003 Security Patrol: Security Considerations for the IFS, Part 2 IBM i (OS/400, i5/OS) | Security 8,106
28 April 2003 Security Patrol: Security Considerations for the Integrated File System (IFS) IBM i (OS/400, i5/OS) | Security 12,921
24 March 2003 Security Patrol: Security Considerations When Using IASPs IBM i (OS/400, i5/OS) | Security 5,182
17 February 2003 Security Patrol: Re-architecting an Application Security Model IBM i (OS/400, i5/OS) | Security 4,425
Carol Woodbury

 

Carol Woodbury is President and CTO of DXR Security and has over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies – SkyView Partners and DXR Security. Her current company - DXR Security - specializes in penetration testing for IBM i. Her practical experience together with her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known world-wide as an author and award-winning speaker on security technology, specializing in IBM i Security topics. She has written seven books on IBM i Security. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.

 


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance: Second Edition IBM i Security Administration and Compliance: Second Edition
Get the must-have guide by the industry’s #1 security authority.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance IBM i Security Administration and Compliance
For beginners to veterans, this is the definitive security resource.
List Price $69.95

Now On Sale