12
Sun, May
1 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
14 June 2019 Top Five Misconfigurations That Leave Your IBM i Vulnerable IBM i (OS/400, i5/OS) | Security 4,264
10 May 2019 New Release! What New Security Features Does IBM i V7R4 Bring Us? IBM i (OS/400, i5/OS) | Security 5,734
17 April 2019 Why Your Business Needs a Security Awareness Program Security - Other | Security 2,780
12 April 2019 What Are the IBM i User Profile Attributes That Really Matter? IBM i (OS/400, i5/OS) | Security 7,378
15 March 2019 How Bad Are Certain IBM i Security Settings? Not So Bad, Pretty Bad, or Really Bad? IBM i (OS/400, i5/OS) | Security 3,755
15 February 2019 What Do You Do When Priorities Change? Why Should You Continue to Pay Attention to IBM i Security? IBM i (OS/400, i5/OS) | Security 3,538
18 January 2019 Why Does It Matter Which Profile Owns IBM i Objects? IBM i (OS/400, i5/OS) | Security 4,973
14 December 2018 What Is That Obscure IBM i System Value QUSEADPAUT? IBM i (OS/400, i5/OS) | Security 3,436
16 November 2018 Things That Make Me Go “Hmm” IBM i (OS/400, i5/OS) | Security 3,193
12 October 2018 Where Have All My Settings Gone? IBM i (OS/400, i5/OS) | Security 2,943
10 August 2018 Why the IBM i Community Needs to Pay Attention to GDPR Compliance / Privacy | Security 3,641
03 August 2018 Three Ways to Use IBM i Authority Collection IBM i (OS/400, i5/OS) | Security 7,589
20 July 2018 Observations from My Round-the-World Trip for IBM i IBM i (OS/400, i5/OS) | Security 3,113
15 June 2018 Ethical Hacking: What It Is and Why You Should Do It Against Your IBM i IBM i (OS/400, i5/OS) | Security 5,735
11 May 2018 Five Tips for Avoiding and Detecting Malware on IBM i IBM i (OS/400, i5/OS) | Security 5,007
13 April 2018 Help! My IBM i Save Security Data (SAVSECDTA) Is Taking Longer and Longer to Complete! IBM i (OS/400, i5/OS) | Security 6,377
16 March 2018 Test Your IBM i Security Knowledge Analytics & Cognitive | 4,239
16 February 2018 Help! My Audit Journal Is Flooding My System! IBM i (OS/400, i5/OS) | Security 7,877
12 January 2018 Things You Hope Your Auditor Never Understands About IBM i Security IBM i (OS/400, i5/OS) | Security 4,499
15 December 2017 Hidden Dangers of the Lesser-Known IBM i Special Authorities IBM i (OS/400, i5/OS) | Security 5,262
10 November 2017 How Can I Determine What an IBM i User Profile Is Used For? IBM i (OS/400, i5/OS) | Security 7,145
13 October 2017 Could IBM i Have Been Part of the Equifax Breach? IBM i (OS/400, i5/OS) | Security 4,068
15 September 2017 Implementing Compensating Controls When IBM i Security Best Practices Aren’t Possible IBM i (OS/400, i5/OS) | Security 5,449
11 August 2017 Debunking the Fake News Surrounding IBM i Security IBM i (OS/400, i5/OS) | Security 5,072
14 July 2017 Five Hints to Help You Make Better Use of the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 5,854
15 June 2017 Five Security-Related Reasons to Care About Your IBM i Backup Strategy IBM i (OS/400, i5/OS) | Security 3,640
26 May 2017 Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability IBM i (OS/400, i5/OS) | Security 8,702
28 April 2017 The Importance of Staying Current IBM i (OS/400, i5/OS) | Security 3,336
17 March 2017 Why IBM i Organizations Should Pay Attention to What Happens in New York Compliance / Privacy | Security 4,901
17 February 2017 Insiders Are a Threat to IBM i? No Way! Yes Way! IBM i (OS/400, i5/OS) | Security 4,014
27 January 2017 Compliance Is Dead, Long Live Compliance! Compliance / Privacy | Security 4,706
16 December 2016 Carol’s IBM i Security Wish List IBM i (OS/400, i5/OS) | Security 3,018
18 November 2016 The Lesser of Two Evils: Choosing the Better IBM i Security Configuration IBM i (OS/400, i5/OS) | Security 3,770
21 October 2016 Tightening IBM i Security with Little Fear of Breakage IBM i (OS/400, i5/OS) | Security 4,012
16 September 2016 Popular Security Terms and How They Relate to IBM i IBM i (OS/400, i5/OS) | Security 3,098
19 August 2016 5 Practical Ways to Use the Audit Journal to Solve your Administration Woes IBM i (OS/400, i5/OS) | Security 5,469
15 July 2016 Security Considerations for IBM i CL Commands IBM i (OS/400, i5/OS) | Security 5,342
01 July 2016 An Introduction to IBM i’s Row and Column Access Control (RCAC) IBM i (OS/400, i5/OS) | Security 6,832
17 June 2016 Take an IBM i Security Quiz IBM i (OS/400, i5/OS) | Security 2,960
20 May 2016 IBM i Exit Points: What They Are and When to Use Them IBM i (OS/400, i5/OS) | Security 9,114
15 April 2016 What’s New in V7R3 Security? IBM i (OS/400, i5/OS) | Security 6,005
18 March 2016 What's the Difference Between a Profile Swap and Adopted Authority? IBM i (OS/400, i5/OS) | Security 5,610
19 February 2016 Moving Your IBM i to a Higher Password Level IBM i (OS/400, i5/OS) | Security 12,025
22 January 2016 What Treasures Are in Those Reports on Your IBM i's IFS? IBM i (OS/400, i5/OS) | Security 4,232
18 December 2015 What Perturbs Carol About IBM i Security? IBM i (OS/400, i5/OS) | Security 4,406
20 November 2015 Time to "Redecorate" Your IBM i? IBM i (OS/400, i5/OS) | Security 4,047
16 October 2015 I Need to Start Somewhere, but Where? IBM i (OS/400, i5/OS) | Security 4,067
18 September 2015 Protect Your Administrator Accounts from Abuse Security - Other | Security 4,392
21 August 2015 Fact or Fiction: Critical Security Flaws Are Found in IBM i IBM i (OS/400, i5/OS) | Security 7,219
24 July 2015 FTP on IBM i: Does It Honor the User Profile's Limited Capability Setting or Not? IBM i (OS/400, i5/OS) | Security 7,144
Carol Woodbury

 

Carol Woodbury is President and CTO of DXR Security and has over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies – SkyView Partners and DXR Security. Her current company - DXR Security - specializes in penetration testing for IBM i. Her practical experience together with her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known world-wide as an author and award-winning speaker on security technology, specializing in IBM i Security topics. She has written seven books on IBM i Security. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.

 


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance: Second Edition IBM i Security Administration and Compliance: Second Edition
Get the must-have guide by the industry’s #1 security authority.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance IBM i Security Administration and Compliance
For beginners to veterans, this is the definitive security resource.
List Price $69.95

Now On Sale