- 101. TNT - 2016/12/16 Webcast Center
- (MC TNT Tips n Techniques)
- ... recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for ...
- Created on 15 December 2016
- 102. RPG - 2016/12/07 Webcast Center
- (MC RPG Developer)
- ... IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations ...
- Created on 06 December 2016
- 103. SI - 2016/12/05 Webcast Center
- (MC System Insight)
- ... IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations ...
- Created on 04 December 2016
- 104. SI - 2016/11/21 Text 1
- (MC System Insight)
- ... Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s ...
- Created on 20 November 2016
- 105. The Lesser of Two Evils: Choosing the Better IBM i Security Configuration
- (IBM i (OS/400, i5/OS))
- Carol describes scenarios where the configuration options aren’t optimal, but a choice must be made. Written by Carol Woodbury By the time you read this, the election in the United States will be over. ...
- Created on 17 November 2016
- 106. TNT - 2016/11/18 Text 2
- (MC TNT Tips n Techniques)
- ... Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s ...
- Created on 17 November 2016
- 107. TNT - 2016/11/11 Webcast Center
- (MC TNT Tips n Techniques)
- ... recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for ...
- Created on 10 November 2016
- 108. TNT - 2016/11/11 Text 2
- (MC TNT Tips n Techniques)
- ... Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s ...
- Created on 10 November 2016
- 109. TNT - 2016/12/16 Webcast Center
- (MC TNT Tips n Techniques)
- ... recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for ...
- Created on 10 November 2016
- 110. RC - 2016-10-31 WC
- (MC Press Resource Centers)
- ... started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for your organization. RECENTLY ...
- Created on 30 October 2016
- 111. Tightening IBM i Security with Little Fear of Breakage
- (IBM i (OS/400, i5/OS))
- Carol describes five IBM i security settings that eliminate exposures and can be changed with very little risk of breaking anything. Written by Carol Woodbury I know that many of you feel handcuffed. ...
- Created on 20 October 2016
- 112. March 16, 2022 | Volume 12 Issue 67
- (MC System Insight)
- LEAD ARTICLE: Dispelling Some Fog About Edge Computing FEATURED ARTICLE: Project Lifecycle, Methodologies, and Standards - Project Management and Quality Management Standards FEATURED EVENT: i am ...
- Created on 08 October 2016
- 113. April 19, 2023 | Volume 12 Issue 80
- (MC System Insight)
- ... Intelligence (AI) Use Cases: Healthcare NEWS HIGHLIGHT: IBM acquires SaaS-based PrestoDB provider Ahana FEATURED VIDEO: A Moment with Carol Woodbury: What Are the Benefits of Pen Testing the IBM i? ...
- Created on 08 October 2016
- 114. May 17, 2023 | Volume 12 Issue 81
- (MC System Insight)
- ... Government and Retail NEWS HIGHLIGHT: IBM Unveils End-to-End Quantum-Safe Technology to Safeguard Governments' and Businesses' Most-Valuable Data FEATURED VIDEO: A Moment with Carol Woodbury: The ...
- Created on 08 October 2016
- 115. April 5, 2023 | Volume 16 Issue 81
- (MC RPG Developer)
- ... Carol Woodbury: Introduction to Pen Testing - NEWS HIGHLIGHT: ChatGPT recommends a VTL for backup; LaserVault ViTL meets the challenge - FEATURED ARTICLE: What Does It Mean To Be an Insights-driven Business? ...
- Created on 08 October 2016
- 116. May 3, 2023 | Volume 16 Issue 82
- (MC RPG Developer)
- - LEAD ARTICLE: Practical SQL: Change Management with SQL - FEATURED ARTICLE: Programming in ILE RPG - DDS Database Concepts - FEATURED VIDEO: A Moment with Carol Woodbury: Network Security Pen Testing ...
- Created on 08 October 2016
- 117. March 11, 2022 | Volume 14 Issue 68
- (MC TNT Tips n Techniques)
- - LEAD ARTICLE: Building Python Applications That Work with Db2, Part 2 - FEATURED WHITE PAPER: Progressive Web Apps: Create a Universal Experience Across All Devices - FEATURED NEWS: IBM Report: Manufacturing ...
- Created on 08 October 2016
- 118. May 12, 2023 | Volume 14 Issue 82
- (MC TNT Tips n Techniques)
- - LEAD ARTICLE: Open Source Starter Guide for IBM i Developers: Ruby and IBM i, An Introduction - FEATURED VIDEO: A Moment with Carol Woodbury: Network Security Pen Testing vs. IBM i Pen Testing - FEATURED ...
- Created on 08 October 2016
- 119. TNT - 2016/10/07 Text 2
- (MC TNT Tips n Techniques)
- ... Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s ...
- Created on 06 October 2016
- 120. Popular Security Terms and How They Relate to IBM i
- (IBM i (OS/400, i5/OS))
- Carol describes terminology prevalent in the security world, explains what it means, and identifies how it applies to IBM i. Written by Carol Woodbury I subscribe to several security-related ...
- Created on 15 September 2016
- 121. 5 Practical Ways to Use the Audit Journal to Solve your Administration Woes
- (IBM i (OS/400, i5/OS))
- ... to help them in their daily jobs. Written by Carol Woodbury The past few weeks, I’ve found myself helping our clients solve their issues by looking for specific entries in the audit journal. ...
- Created on 18 August 2016
- 122. Security Considerations for IBM i CL Commands
- (IBM i (OS/400, i5/OS))
- Carol answers the questions you’ve been asking about securing IBM i commands. Written by Carol Woodbury Every once in a while, I get asked a question that spurs on an idea for an article. That’s what ...
- Created on 14 July 2016
- 123. An Introduction to IBM i’s Row and Column Access Control (RCAC)
- (IBM i (OS/400, i5/OS))
- This is powerful stuff. You must understand the implications of and plan for the security aspects of an RCAC implementation. Written by Carol Woodbury This article is adapted from IBM i Security ...
- Created on 30 June 2016
- 124. Take an IBM i Security Quiz
- (IBM i (OS/400, i5/OS))
- Carol provides a quiz to test your knowledge of IBM i security facts. Written by Carol Woodbury Many times, I want to make sure to tell everyone about an interesting IBM i security feature ...
- Created on 16 June 2016
- 125. Book Review: IBM i Security Administration and Compliance, Second Edition
- (IBM i (OS/400, i5/OS))
- ... Edition, the latest version of Carol Woodbury’s well-known IBM i security reference, starts with Carol laying out her goals for the book, which are to provide the reader with choices, practical implementation ...
- Created on 09 June 2016
- 126. IBM i Exit Points: What They Are and When to Use Them
- (IBM i (OS/400, i5/OS))
- Carol explains the concept of exit programs and provides examples of how they can be used to customize your IBM i administration. Written by Carol Woodbury The terms “exit point” and “exit ...
- Created on 19 May 2016
- 127. Growing Interest in IBM i Security
- (IBM i (OS/400, i5/OS))
- ... who wants to engage in tightening the locks down on their objects. People like Carol Woodbury and her team, who are more responsible for the service kind of things, are very excited for the value that ...
- Created on 15 May 2016
- 128. What’s New in V7R3 Security?
- (IBM i (OS/400, i5/OS))
- Carol discusses the security features coming in the new version of IBM i. Written by Carol Woodbury V7R3 provides some new and changed features in the IBM i integrated auditing function as well as ...
- Created on 14 April 2016
- 129. HelpSystems Announces Speaker Lineup at ShiftIT User Conference
- (Certification / Training)
- ... and industry topics. Guest speakers feature leading IBM i security experts Jeff Uehling of IBM, Carol Woodbury, and Robin Tatam; cloud infrastructure and business continuity leaders Keith Zblewski ...
- Created on 11 April 2016
- 130. What's the Difference Between a Profile Swap and Adopted Authority
- (IBM i (OS/400, i5/OS))
- Carol discusses the differences between these two methods of elevating authority on the IBM i. Written by Carol Woodbury Many organizations have the requirement to reduce the number of profiles to ...
- Created on 18 March 2016
- 131. Moving Your IBM i to a Higher Password Level
- (IBM i (OS/400, i5/OS))
- ... Woodbury There's heightened focus across the IBM i community to improve the power of passwords. That's music to my ears! Here are the considerations you'll have to make when moving the system to a higher ...
- Created on 18 February 2016
- 132. What Treasures Are in Those Reports on Your IBM i's IFS
- (IBM i (OS/400, i5/OS))
- Carol provides guidance on protecting data in printed reports. Written by Carol Woodbury I get inspiration for this column from a variety of places, but I have to give credit to one of my clients for ...
- Created on 21 January 2016
- 133. What Perturbs Carol About IBM i Security?
- (IBM i (OS/400, i5/OS))
- Carol provides her pet peeves when it comes to IBM i security configuration. Written by Carol Woodbury At this time of year, many lists of favorites are published, but I thought I'd take a slightly ...
- Created on 17 December 2015
- 134. Time to "Redecorate" Your IBM i
- (IBM i (OS/400, i5/OS))
- Carol provides suggestions for ways you can "spruce up" your security configuration. Written by Carol Woodbury I've been in my house for a while now, and I'm looking around and thinking that it's time ...
- Created on 19 November 2015
- 135. HelpSystems Provides Penetration Testing for IBM i
- (New Products, Agreements and Trends)
- ... is also required by the Payment Card Industry Data Security Standard (PCI DSS) as of June 30, 2015. Carol Woodbury, renowned security expert and Vice President of Global Security Services at HelpSystems, ...
- Created on 27 October 2015
- 136. If Your IBM i Is Hacked, How Long Will It Be Before You Know?
- (IBM i (OS/400, i5/OS))
- ... security sessions at COMMON (and other events), public webinars, and a plethora of online reading materials. For many, Carol Woodbury's excellent book IBM i Security Administration and Compliance is never ...
- Created on 26 October 2015
- 137. I Need to Start Somewhere, but Where?
- (IBM i (OS/400, i5/OS))
- Carol provides three questions you'll need to answer to get you started on your journey toward a more secure IBM i system. Written by Carol Woodbury The realization hits that you need to do something ...
- Created on 16 October 2015
- 138. Protect Your Administrator Accounts from Abuse
- (Security - Other)
- Carol discusses why it's important to protect administrative profiles and provides options for protecting them. Written by Carol Woodbury If you've paid attention to the news of stolen data, you've heard ...
- Created on 18 September 2015
- 139. Fact or Fiction: Critical Security Flaws Are Found in IBM i
- (IBM i (OS/400, i5/OS))
- Carol Woodbury discusses a recent presentation at Defcon asserting that there are critical security flaws in IBM i. Written by Carol Woodbury As a security professional who's made her career espousing ...
- Created on 21 August 2015
- 140. FTP on IBM i: Does It Honor the User Profile's Limited Capability Setting or Not
- (IBM i (OS/400, i5/OS))
- Carol explains why you need to be concerned about profiles' limited capability setting when considering the risks FTP poses to your organization. Written by Carol Woodbury Many IBM i shops continue ...
- Created on 24 July 2015
- 141. HelpSystems Releases New Version of IBM i Security Assessment Software
- (Compliance / Privacy)
- ... requirements and leverage IBM i’s evolving security capablities,” said Carol Woodbury, Vice President of Global Security Services, HelpSystems. Customers already using Risk Assessor can upgrade to ...
- Created on 08 July 2015
- 142. The Benefits of a Strong Security Implementation…Beyond Security
- (IBM i (OS/400, i5/OS))
- Carol explains the benefits of implementing the features of IBM i security…beyond the obvious security-related benefits. Written by Carol Woodbury While the benefits of using the integrated features ...
- Created on 19 June 2015
- 143. HelpSystems Acquires SkyView Partners, Adds Security Expertise, Managed Services, and Software
- (Mergers / Acquisitions)
- SkyView team of industry experts, led by Carol Woodbury and John Vanderwall, join HelpSystems. SkyView team of industry experts, led by Carol Woodbury and John Vanderwall, join HelpSystems. Companies ...
- Created on 02 June 2015
- 144. Tips for Preparing for an IBM i Audit
- (IBM i (OS/400, i5/OS))
- Audits may not always be your favorite activity, but there are a few things you can do ahead of time to prepare and make it less painful. Written by Carol Woodbury Many administrators go through what ...
- Created on 15 May 2015
- 145. True or False: A Pop Quiz on IBM i Security Facts
- (IBM i (OS/400, i5/OS))
- It's Friday, and Carol remembers how much everyone loves a surprise test right before the weekend. Written by Carol Woodbury I don't know about you, but I've always hated taking tests. Hopefully, you ...
- Created on 17 April 2015
- 146. IFS for IBM i in Review
- (IBM i (OS/400, i5/OS))
- Carol talks about some configuration settings not to ignore in the IFS. Written by Carol Woodbury Many of you are daunted by the security aspects of the Integrated File System (IFS), but there are ...
- Created on 20 March 2015
- 147. Group Profiles in Review
- (IBM i (OS/400, i5/OS))
- Carol takes a look at the proper use and configuration of group profiles. Written by Carol Woodbury I realized that it's been awhile since I've discussed group profiles, so this article is a review of ...
- Created on 19 February 2015
- 148. PCI and the IBM i: If You're Not Paying Attention, You Should B
- (Compliance / Privacy)
- ... write a book about it. But, why reinvent the wheel? Luckily, Carol Woodbury, one of the original architects of security in i5/OS, actually did write a book about it. Our company has incorporated it into ...
- Created on 08 February 2015
- 149. Start Thinking About Security in New Ways
- (Compliance / Privacy)
- ... Written by Carol Woodbury At this time of year, I try to get away for a few days to relax and stop thinking about work. I've found that when I'm constantly heads down on work, I don't pick up on things ...
- Created on 22 January 2015
- 150. Carol's Favorite (IBM i and Other) Thing
- (IBM i (OS/400, i5/OS))
- Carol reveals what inspires her and makes her happy. Written by Carol Woodbury It's the time of year when Oprah releases her list of favorite things, so Carol shares her list of favorite IBM i features ...
- Created on 18 December 2014