21
Sat, Dec
3 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
21 August 2015 Fact or Fiction: Critical Security Flaws Are Found in IBM i IBM i (OS/400, i5/OS) | Security 7,706
24 July 2015 FTP on IBM i: Does It Honor the User Profile's Limited Capability Setting or Not? IBM i (OS/400, i5/OS) | Security 7,846
19 June 2015 The Benefits of a Strong Security Implementation…Beyond Security IBM i (OS/400, i5/OS) | Security 3,922
15 May 2015 Tips for Preparing for an IBM i Audit IBM i (OS/400, i5/OS) | Security 4,446
17 April 2015 True or False: A Pop Quiz on IBM i Security Facts IBM i (OS/400, i5/OS) | Security 5,276
20 March 2015 IFS for IBM i in Review IBM i (OS/400, i5/OS) | Security 5,940
20 February 2015 Group Profiles in Review IBM i (OS/400, i5/OS) | Security 4,781
23 January 2015 Start Thinking About Security in New Ways Compliance / Privacy | Security 4,627
19 December 2014 Carol's Favorite (IBM i and Other) Things IBM i (OS/400, i5/OS) | Security 5,145
21 November 2014 Protecting Your Passwords on IBM i IBM i (OS/400, i5/OS) | Security 5,472
17 October 2014 Who's More Dangerous? The Person You Know or the Person You Don't Know? Security - Other | Security 4,235
19 September 2014 Adopted Authority: Friend or Foe? IBM i (OS/400, i5/OS) | Security 6,304
15 August 2014 Security Patrol: The Hidden Dangers of Shadow IT Security - Other | Security 5,042
18 July 2014 Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls IBM i (OS/400, i5/OS) | Security 8,184
14 July 2014 Before Moving to the Cloud, Get Your Rain Gear On Security - Other | Security 4,559
20 June 2014 Security Patrol: V7R2 Security Enhancements, Part 1 IBM i (OS/400, i5/OS) | Security 7,785
16 May 2014 Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? IBM i (OS/400, i5/OS) | Security 12,271
18 April 2014 Security Patrol: Detecting a Breach IBM i (OS/400, i5/OS) | Security 5,047
21 March 2014 Security Patrol: Pretend You've Been Hacked Security - Other | Security 4,320
24 February 2014 Virus Got You Down? IBM i (OS/400, i5/OS) | Security 4,788
10 February 2014 PCI and What It Means to IBM i IBM i (OS/400, i5/OS) | Security 4,289
10 June 2013 Top Ten Security Considerations for the Cloud Compliance / Privacy | Security 4,960
13 May 2013 Top Ten New Features of IBM i Security IBM i (OS/400, i5/OS) | Security 5,063
11 March 2013 5 Ways to Control Access using Application Administration IBM i (OS/400, i5/OS) | Security 4,835
26 November 2012 5 Steps for Implementing Role-Based Access on the IBM i IBM i (OS/400, i5/OS) | Security 4,657
13 June 2012 Securing Your Printed Output IBM i (OS/400, i5/OS) | Security 5,814
11 June 2012 Protecting Your Data: How Much Security Is Enough? Compliance / Privacy | Security 4,403
23 May 2012 Common Questions You Have About AIX Security but Were Afraid to Ask UNIX / AIX | Operating Systems | IT Infrastructure 13,923
23 April 2012 Security Considerations for the Cloud Compliance / Privacy | Security 4,517
08 August 2011 Security and the Cloud: Blue Skies or a Major Storm? Compliance / Privacy | Security 5,046
13 June 2011 What Authorities Do Programmers Really Need? IBM i (OS/400, i5/OS) | Security 5,980
09 May 2011 You Don't Trust Me Anymore! Compliance / Privacy | Security 38,444
28 February 2011 Ways to Use the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 9,280
25 October 2010 What's Hot and What's Not in the World of Security Technology Security - Other | Security 6,202
11 October 2010 Getting a Jump Start on Your Impending Audit! IBM i (OS/400, i5/OS) | Security 5,241
08 September 2010 Does Privacy Assure Compliance? Compliance / Privacy | Security 6,476
09 August 2010 Security Considerations for the Cloud Security - Other | Security 5,479
24 May 2010 Does Compliance Guarantee Privacy? Compliance / Privacy | Security 6,159
14 April 2010 Sneak Peek of the New Security Features in V7 IBM i (OS/400, i5/OS) | Security 7,561
25 January 2010 Do You Understand the Foundations Behind Today's Compliance Laws and Regulations? Compliance / Privacy | Security 7,011
26 October 2009 Partner TechTip: Setting Authority Is Not a One-Time Event Security - Other | Security 6,328
26 August 2009 Partner TechTip: Do "Sensitive" Commands Need Extra Security? Security - Other | Security 6,676
22 June 2009 Partner TechTip: Why Should You Care What Happens in Massachusetts? Security - Other | Security 5,856
05 April 2009 SkyView Risk Assessor Now Includes PCI-Specific Considerations Compliance / Privacy | Security News | News 5,860
22 March 2009 Compliance Without the Complexities Security - Other | Security 7,014
11 February 2009 Employing Best Practices for IBM i Security IBM i (OS/400, i5/OS) | Security 8,668
11 February 2009 Partner TechTip: Let's Review! Security - Other | Security 6,351
19 December 2008 Partner TechTip: Five Tips for Protecting Your Organization Security - Other | Security 5,805
14 November 2008 Partner TechTip: Don't Forget These User Profile Attributes Security - Other | Security 7,104
17 October 2008 Partner TechTip: How Do You Ensure Data Integrity? Security - Other | Security 6,724
Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale