19
Sun, May
7 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
19 June 2015 The Benefits of a Strong Security Implementation…Beyond Security IBM i (OS/400, i5/OS) | Security 3,509
15 May 2015 Tips for Preparing for an IBM i Audit IBM i (OS/400, i5/OS) | Security 4,033
17 April 2015 True or False: A Pop Quiz on IBM i Security Facts IBM i (OS/400, i5/OS) | Security 4,761
20 March 2015 IFS for IBM i in Review IBM i (OS/400, i5/OS) | Security 5,461
20 February 2015 Group Profiles in Review IBM i (OS/400, i5/OS) | Security 4,307
23 January 2015 Start Thinking About Security in New Ways Compliance / Privacy | Security 4,132
19 December 2014 Carol's Favorite (IBM i and Other) Things IBM i (OS/400, i5/OS) | Security 4,701
21 November 2014 Protecting Your Passwords on IBM i IBM i (OS/400, i5/OS) | Security 5,048
17 October 2014 Who's More Dangerous? The Person You Know or the Person You Don't Know? Security - Other | Security 3,858
19 September 2014 Adopted Authority: Friend or Foe? IBM i (OS/400, i5/OS) | Security 5,705
15 August 2014 Security Patrol: The Hidden Dangers of Shadow IT Security - Other | Security 4,651
18 July 2014 Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls IBM i (OS/400, i5/OS) | Security 7,698
14 July 2014 Before Moving to the Cloud, Get Your Rain Gear On Security - Other | Security 4,047
20 June 2014 Security Patrol: V7R2 Security Enhancements, Part 1 IBM i (OS/400, i5/OS) | Security 7,344
16 May 2014 Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? IBM i (OS/400, i5/OS) | Security 11,306
18 April 2014 Security Patrol: Detecting a Breach IBM i (OS/400, i5/OS) | Security 4,525
21 March 2014 Security Patrol: Pretend You've Been Hacked Security - Other | Security 3,803
24 February 2014 Virus Got You Down? IBM i (OS/400, i5/OS) | Security 4,291
10 February 2014 PCI and What It Means to IBM i IBM i (OS/400, i5/OS) | Security 3,851
10 June 2013 Top Ten Security Considerations for the Cloud Compliance / Privacy | Security 4,493
13 May 2013 Top Ten New Features of IBM i Security IBM i (OS/400, i5/OS) | Security 4,521
11 March 2013 5 Ways to Control Access using Application Administration IBM i (OS/400, i5/OS) | Security 4,370
26 November 2012 5 Steps for Implementing Role-Based Access on the IBM i IBM i (OS/400, i5/OS) | Security 4,140
13 June 2012 Securing Your Printed Output IBM i (OS/400, i5/OS) | Security 5,219
11 June 2012 Protecting Your Data: How Much Security Is Enough? Compliance / Privacy | Security 3,919
23 May 2012 Common Questions You Have About AIX Security but Were Afraid to Ask UNIX / AIX | Operating Systems | IT Infrastructure 13,438
23 April 2012 Security Considerations for the Cloud Compliance / Privacy | Security 3,930
08 August 2011 Security and the Cloud: Blue Skies or a Major Storm? Compliance / Privacy | Security 4,648
13 June 2011 What Authorities Do Programmers Really Need? IBM i (OS/400, i5/OS) | Security 5,528
09 May 2011 You Don't Trust Me Anymore! Compliance / Privacy | Security 38,045
28 February 2011 Ways to Use the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 8,754
25 October 2010 What's Hot and What's Not in the World of Security Technology Security - Other | Security 5,919
11 October 2010 Getting a Jump Start on Your Impending Audit! IBM i (OS/400, i5/OS) | Security 4,850
08 September 2010 Does Privacy Assure Compliance? Compliance / Privacy | Security 6,040
09 August 2010 Security Considerations for the Cloud Security - Other | Security 5,167
24 May 2010 Does Compliance Guarantee Privacy? Compliance / Privacy | Security 5,780
14 April 2010 Sneak Peek of the New Security Features in V7 IBM i (OS/400, i5/OS) | Security 7,199
25 January 2010 Do You Understand the Foundations Behind Today's Compliance Laws and Regulations? Compliance / Privacy | Security 6,506
26 October 2009 Partner TechTip: Setting Authority Is Not a One-Time Event Security - Other | Security 6,008
26 August 2009 Partner TechTip: Do "Sensitive" Commands Need Extra Security? Security - Other | Security 6,355
22 June 2009 Partner TechTip: Why Should You Care What Happens in Massachusetts? Security - Other | Security 5,472
05 April 2009 SkyView Risk Assessor Now Includes PCI-Specific Considerations Compliance / Privacy | Security News | News 5,592
22 March 2009 Compliance Without the Complexities Security - Other | Security 6,709
11 February 2009 Employing Best Practices for IBM i Security IBM i (OS/400, i5/OS) | Security 8,165
11 February 2009 Partner TechTip: Let's Review! Security - Other | Security 5,982
19 December 2008 Partner TechTip: Five Tips for Protecting Your Organization Security - Other | Security 5,412
14 November 2008 Partner TechTip: Don't Forget These User Profile Attributes Security - Other | Security 6,761
17 October 2008 Partner TechTip: How Do You Ensure Data Integrity? Security - Other | Security 6,426
19 September 2008 Partner TechTip: Answers to Your Burning i5/OS Auditing Questions Security - Other | Security 6,339
20 June 2008 Partner TechTip: Utilizing the QUSEADPAUT System Value Security - Other | Security 6,994
Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale