- 151. The 12 Sections of PCI DSS and How each Relates to the IBM i Community
- (MC Security)
- In this session, Carol Woodbury draws on her experience consulting with SkyView Partners' clients and helping them with their PCI DSS implementation and compliance requirements. Carol explains each of ...
- Created on 09 December 2014
- 152. Protecting Your Passwords on IBM i
- (IBM i (OS/400, i5/OS))
- ... organizations. Carol discusses how to reduce password abuse. Written by Carol Woodbury You may not realize it, but many of the organizations recently breached are large IBM i shops. The general ...
- Created on 20 November 2014
- 153. Top 10 Security and Compliance Considerations for Cloud Computing
- (MC Security)
- ... Coffee with Carol session, Carol Woodbury will discuss the top 10 considerations you should make as well as how to ensure that your organization's security and compliance requirements are not compromised. ...
- Created on 04 November 2014
- 154. Technology Focus: The IBM i Isn't Immune to Security Problems
- (IBM i (OS/400, i5/OS))
- ... according to Carol J. Woodbury, president and co-founder of SkyView Partners. "[This is] based on the false belief that IBM i is secure by default, or by the idea that a breach just can't/won't happen to ...
- Created on 20 October 2014
- 155. Who's More Dangerous? The Person You Know or the Person You Don't Kno
- (Security - Other)
- While external hacking incidents have been making the headlines recently, we can't ignore the insider threat. Written by Carol Woodbury I'm fortunate to live in Seattle, where I have access to many professional ...
- Created on 17 October 2014
- 156. Adopted Authority: Friend or Foe?
- (IBM i (OS/400, i5/OS))
- Carol discusses the pros and cons of using adopted authority. Written by Carol Woodbury The answer to the question posed in the title of this article is "Yes." Let me explain. Adopted authority ...
- Created on 19 September 2014
- 157. Top Ten Security Vulnerabilities of IBM i Security Configuration
- (MC Security)
- SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found ...
- Created on 09 September 2014
- 158. Security Patrol: The Hidden Dangers of Shadow IT
- (Security - Other)
- Carol discusses the dangers of allowing IT projects outside of the IT team and the problems doing so can present to your organization. Written by Carol Woodbury I've heard them called by several terms—"rogue ...
- Created on 15 August 2014
- 159. Step by Step Approach to Implementing Object Level Security
- (MC Security)
- ... many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, ...
- Created on 11 August 2014
- 160. Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls
- (IBM i (OS/400, i5/OS))
- Carol provides the second part of a two-part article on the security enhancements introduced in V7R2. Written by Carol Woodbury Last month, I covered the auditing, password composition rule, and other ...
- Created on 18 July 2014
- 161. Before Moving to the Cloud, Get Your Rain Gear On
- (Security - Other)
- The key to success is planning. Written by Carol Woodbury Since I live in Seattle, it's only fitting that I discuss the preparations you need to make prior to moving to the cloud. One requirement for ...
- Created on 14 July 2014
- 162. Best Practices for IBM i Security Administration
- (MC Security)
- Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform. From system values ...
- Created on 09 July 2014
- 163. Security Patrol: V7R2 Security Enhancements, Part 1
- (IBM i (OS/400, i5/OS))
- Carol provides the first part of a two-part article on the security enhancements introduced in V7R2. Written by Carol Woodbury Each new release of IBM i provides some enhancements, but this version ...
- Created on 20 June 2014
- 164. Configuring IBM i iSeries Access Server to Use SSL
- (MC Security)
- In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted ...
- Created on 05 June 2014
- 165. Security Patrol: What Do You Do with Those IBM-Supplied User Profiles?
- (IBM i (OS/400, i5/OS))
- Carol discusses what you should—and shouldn't—do with all of the user profiles that are provided with the IBM i operating system. Written by Carol Woodbury When IBM i is installed, numerous user profiles ...
- Created on 16 May 2014
- 166. Tour of SkyView Managed Security Services
- (MC Security)
- Carol Woodbury profiles a quick tour of the benefits of SkyView's Managed Security Services. • SkyView Managed Security Services is a monthly offering where SkyView Security Experts (led by Carol Woodbury) ...
- Created on 09 May 2014
- 167. Security Patrol: Detecting a Breach
- (IBM i (OS/400, i5/OS))
- Carol discusses the actions to review that may indicate your system is under attack or has been breached. Written by Carol Woodbury Last month, I discussed the unthinkable—that your IBM i system has ...
- Created on 18 April 2014
- 168. Are You Meeting the PCI DSS Security Standards?
- (Compliance / Privacy)
- ... on this subject, we suggest you and your administrators study the comprehensive book by Carol Woodbury. The author's company provides a copy of this book to all of their customers as an integral part of ...
- Created on 14 April 2014
- 169. IBM i Security Administrators' Guide
- (Compliance / Privacy)
- Security is no longer something you can put off until tomorrow. Written by SkyView Partners Carol Woodbury, president and co-founder of SkyView Partners, Inc., takes her years of experience and ...
- Created on 24 March 2014
- 170. Security Patrol: Pretend You've Been Hacke
- (Security - Other)
- In her return to her Security Patrol post, Carol Woodbury discusses the ways you can prepare for the unthinkable. Written by Carol Woodbury I'd like you to imagine the unthinkable—that your ...
- Created on 21 March 2014
- 171. Virus Got You Down?
- (IBM i (OS/400, i5/OS))
- Defending a system against viruses involves the prevention, detection, and avoidance of attacks. Written by Carol Woodbury Editor's note: This article introduces the white paper "Virus Got You Down?" ...
- Created on 23 February 2014
- 172. PCI and What It Means to IBM i
- (IBM i (OS/400, i5/OS))
- Do you know what's in the new version of the PCI DSS released in November 2013? Written by Carol Woodbury Editor's note: This article introduces the white paper "PCI and What It Means to IBM ...
- Created on 09 February 2014
- 173. Technology Focus: Are You Ready for Your Next Audit?
- (Compliance / Privacy)
- ... compliance validation an ongoing activity." Busy, Busy Carol Woodbury, president and co-founder of SkyView Partners, emphasizes Tatam's final concern—and adds another. "Most organizations are strapped ...
- Created on 19 January 2014
- 174. SkyView Partners Introduces IBM i Security Administrators' Guide
- (Compliance / Privacy)
- ... on the experience of Carol Woodbury and her work with clients during the last 12 years at SkyView Partners Inc., defines the role of security administrator including the values for key security settings, ...
- Created on 20 August 2013
- 175. Top Ten Security Considerations for the Cloud
- (Compliance / Privacy)
- ... by Carol Woodbury Editor's Note: This article introduces the webcast "Top Ten Security Considerations for the Cloud" available free to view at the MC Webcast Center. Many organizations are moving ...
- Created on 10 June 2013
- 176. IBM i Security Review - You don't know what you don't know! ...
- (MC Security)
- Carol Woodbury, President of SkyView Partners, describes why you might want or need to have a security review of your IBM i systems done and why it's important to have an expert perform that review ...
- Created on 16 May 2013
- 177. Top Ten New Features of IBM i Security
- (IBM i (OS/400, i5/OS))
- Find out about the new enhancements IBM has delivered in recent releases. Written by Carol Woodbury Editor's Note: This article introduces the webcast "Top Ten New Features of IBM i Security" available ...
- Created on 13 May 2013
- 178. Technology Focus: In the Realm of Auditing and Compliance, the Song Remains the Same
- (Compliance / Privacy)
- ... often have power that exceeds the actual authority needed for their specific problem." "Too much authority to data," is how Carol Woodbury, president and co-founder of Skyview Partners, puts it. ...
- Created on 15 April 2013
- 179. Velocity Technology Solutions Introduces IBM Power Systems Universal Cloud Services at COMMON 2013
- (Other Industry Solutions)
- ... - An *ALLUSR Experience." Co-presented with Carol Woodbury, President and Co-Founder of SkyView Partners, a firm specializing in security administration, compliance management software, and security consultin ...
- Created on 03 April 2013
- 180. 5 Ways to Control Access using Application Administration
- (IBM i (OS/400, i5/OS))
- Never heard of Application Administration? Don’t be surprised. Although it’s full of function, it’s one of little-known features of IBM i. Written by Carol Woodbury Editor's note: This article introduces ...
- Created on 11 March 2013
- 181. The 12 Sections of PCI DSS and How Each Relates to the IBM i Community
- (Compliance / Privacy)
- Carol Woodbury and her team refresh everyone's memory as to what PCI means to the IBM i. Written by Skyview Partners While one may think that the Payment Card Industry (PCI) is a thing of the past ...
- Created on 24 February 2013
- 182. 5 Steps for Implementing Role-Based Access on the IBM i
- (IBM i (OS/400, i5/OS))
- Learn how role-based access can help you secure your sensitive information. Written by Carol Woodbury Editor's Note: This article is an introduction to the Webcast "5 Steps for Implementing Role-Based ...
- Created on 25 November 2012
- 183. Book Review: IBM i Security: Administration and Compliance
- (IBM i (OS/400, i5/OS))
- ... deployment. As the AS/400 Chief Security Architect for more than 10 years, Carol Woodbury packs more security expertise in her petite stature than most people twice her size! IBM i Security: Administration ...
- Created on 08 November 2012
- 184. SkyView Policy Minder Will Be Integrated into Vision Solutions Portal
- (New Products, Agreements and Trends)
- ... and security compliance becomes a daily routine and discipline," says Carol Woodbury, president of SkyView Partners, Inc. “We are excited to see this new facet of Policy Minder as we make it available ...
- Created on 19 July 2012
- 185. Securing Your Printed Output
- (IBM i (OS/400, i5/OS))
- Be sure you're managing confidential data appropriately. Written by Carol Woodbury Editor's Note: This article is an excerpt (chapter 8) from IBM i Security Administration and Compliance, published by ...
- Created on 13 June 2012
- 186. Protecting Your Data: How Much Security Is Enough?
- (Compliance / Privacy)
- An organization's data is a vital corporate asset. So how do you determine how much security is enough to adequately protect that data? Written by Carol Woodbury Editor's Note: This is an introduction ...
- Created on 11 June 2012
- 187. Common Questions You Have About AIX Security but Were Afraid to Ask
- (UNIX / AIX)
- In this article, security expert Carol Woodbury answers those nagging questions you have about AIX security. Written by Carol Woodbury Security terms are thrown about in articles and manuals, but do ...
- Created on 23 May 2012
- 188. COMMON Conference Reveals IBM Roadmap Includes Support for IBM i
- (Trends)
- ... Ready, Set, Plan–Richard Dolewski Step-by-Step Approach to Implementing Object Level Security–Carol Woodbury RPG IV Does XML–Exploiting RPG's XML Processing Capabilities–Jon Paris What You Need to ...
- Created on 11 May 2012
- 189. Security Considerations for the Cloud
- (Compliance / Privacy)
- ... policies. Written by Carol Woodbury Editor's Note: This article is an introduction to the white paper "Security Considerations for the Cloud" available free to download from the MC White Paper Center. ...
- Created on 23 April 2012
- 190. Webcast: Automating IBM AIX PCI Compliance Reporting
- (UNIX / AIX)
- ... the help of SkyView's Policy Minder for AIX for IBM i and i5/OS. In the Webcast, Carol Woodbury, president and CTO of SkyView Partners, discusses the 12 sections of the AIX PCI DSS and explains how Policy ...
- Created on 28 March 2012
- 191. Security and the Cloud: Blue Skies or a Major Storm?
- (Compliance / Privacy)
- ... Written by Carol Woodbury Editor's Note: This article introduces the Webcast "Coffee with Carol: Security and the Cloud—Blue Skies or Major Storm" available for free download from the MC Webcast Center. ...
- Created on 08 August 2011
- 192. What Authorities Do Programmers Really Need?
- (IBM i (OS/400, i5/OS))
- It may take a bit of investigation to determine exactly what authorities programmers require, but they rarely need all-encompassing special authorities. Written by Carol Woodbury Editor's Note: This ...
- Created on 13 June 2011
- 193. You Don't Trust Me Anymore
- (Compliance / Privacy)
- System administrators and programmers are feeling the pinch of numerous regulations that are interfering with how they do their jobs. Written by Carol Woodbury Editor's Note: This article is an extract ...
- Created on 09 May 2011
- 194. Ways to Use the IBM i Audit Journal
- (IBM i (OS/400, i5/OS))
- The amount of information available in the audit journal is impressive, but the AJ also is one of the system's best-kept secrets. Written by Carol Woodbury The following is taken from the white paper ...
- Created on 27 February 2011
- 195. What's Hot and What's Not in the World of Security Technolo
- (Security - Other)
- In this article, security expert Carol Woodbury discusses technologies in the security world that are hot and some that are not so hot. Written by Carol Woodbury I'm sincerely hoping this article doesn' ...
- Created on 25 October 2010
- 196. Getting a Jump Start on Your Impending Audit!
- (IBM i (OS/400, i5/OS))
- Even if your auditors don't have actual knowledge of i5/OS security themselves, they typically have a "playbook" of audit points to look for in your i5/OS security configuration. Written by Carol Woodbury ...
- Created on 11 October 2010
- 197. SkyView Announces SkyView Auditor Journal Reporter for IBM i and i5/OS
- (New Products, Agreements and Trends)
- ... customers need," says Carol Woodbury, SkyView Partners president. We listened carefully and are responding by delivering a customized product tailored to answer the questions that we see the auditors asking,” ...
- Created on 29 September 2010
- 198. Does Privacy Assure Compliance?
- (Compliance / Privacy)
- In this article, security expert Carol Woodbury discusses whether keeping data private assures compliance. Written by Carol Woodbury In my previous article, "Does Compliance Guarantee Privacy?" I came ...
- Created on 08 September 2010
- 199. New SkyView Policy Minder 1.5 Enhances Management of User Profile Configurations
- (Compliance / Privacy)
- ... “There are a number of exciting new enhancements to our product," says Carol Woodbury, president of SkyView Partners. "Because compliance requirements keep changing, we have tried to add functionality ...
- Created on 24 August 2010
- 200. Security Considerations for the Cloud
- (Security - Other)
- Are these concerns justified, or is it simply the fear of the unknown? Written by Carol Woodbury Editor's note: This is an excerpt from the white paper "Cloud Computing," which is available as a free ...
- Created on 09 August 2010