- 1. A Moment with Carol Woodbury: Taking the Mystery Out of Group Profiles
- (IBM i (OS/400, i5/OS))
- Group profiles help with role-based access on the IBM i. By Carol Woodbury Join Carol in this video to understand a bit more about group profiles and how you can use them to implement role-based access ...
- Created on 30 May 2023
- 2. A Moment with Carol Woodbury: The Benefits of Authorizations Lists
- (IBM i (OS/400, i5/OS))
- Authorizations lists or group profiles. It seems to be an age-old argument in the IBM i security community. By Carol Woodbury There is a great time to use both. In this video, Carol explains why authorizations ...
- Created on 16 May 2023
- 3. A Moment with Carol Woodbury: Network Security Pen Testing vs. IBM i Pen Testing
- (IBM i (OS/400, i5/OS))
- Everybody does a Network Security Pen Test these days. By Carol Woodbury So how is that different from an IBM i Pen Test? Join Carol Woodbury in this video as she shares a very brief and simple analogy ...
- Created on 11 May 2023
- 4. A Moment with Carol Woodbury: Introduction to Pen Testing
- (IBM i (OS/400, i5/OS))
- Ever wonder what the difference is between Risk Assessments and Pen Testing for your IBM i? In this video, Carol Woodbury explains her experience with Risk Assessments and how Pen Testing gives “proof” ...
- Created on 03 April 2023
- 5. A Moment with Carol Woodbury: Introduction to Pen Testing
- (MC Security)
- Ever wonder what the difference is between Risk Assessments and Pen Testing for your IBM i? In this video, Carol Woodbury explains her experience with Risk Assessments and how Pen Testing gives “proof” ...
- Created on 28 March 2023
- 6. A Moment with Carol Woodbury: How Does an IBM i Pen Test Work?
- (MC Security)
- Everyone asks us exactly what we do to accomplish an IBM i Pen Test. In this video, Carol Woodbury goes into a brief but detailed description of how we go about the task of Pen Testing the IBM i. She ...
- Created on 28 March 2023
- 7. A Moment with Carol Woodbury: What Are the Benefits of Pen Testing the IBM i?
- (MC Security)
- Security is only as good as the configuration. An IBM i Pen Test proves that your system security is configured properly. Doing an IBM i Pen Test helps you figure out the holes in your security and ...
- Created on 28 March 2023
- 8. A Moment with Carol Woodbury: Network Security Pen Testing vs. IBM i Pen Testing
- (MC Security)
- Everybody does a Network Security Pen Test these days. So how is that different from an IBM i Pen Test? Join Carol Woodbury in this video as she shares a very brief and simple analogy that describes Network ...
- Created on 28 March 2023
- 9. A Moment with Carol Woodbury: The Benefits of Authorizations Lists
- (MC Security)
- Authorizations lists or group profiles. It seems to be an age-old argument in the IBM i security community. There is a great time to use both. In this video, Carol explains why authorizations lists help ...
- Created on 28 March 2023
- 10. A Moment with Carol Woodbury: Taking the Mystery Out of Group Profiles
- (MC Security)
- Group profiles help with role-based access on the IBM i. Join Carol in this video to understand a bit more about group profiles and how you can use them to implement role-based access on your IBM i. She ...
- Created on 28 March 2023
- 11. Security Patrol: Introducing Security Officer Carol Woodbury
- (IBM i (OS/400, i5/OS))
- ... Woodbury, newly appointed security officer of this monthly feature. I admit to accepting this new position with a bit of trepidation, because the previous security officers have filled their respective ...
- Created on 29 July 2002
- 12. Mastering IBM i Security - System Values
- (IBM i (OS/400, i5/OS))
- If you’ve ever heard me speak on the Fundamentals of IBM i Security, you’ve heard me describe its three core aspects: system values, user profiles, and object security. By Carol Woodbury Editor's Note: ...
- Created on 09 December 2024
- 13. Another IBM Champion Joins the Kisco Team
- (Industry News)
- ... Justin. “Steve’s remarkable depth of character makes him the ideal fit for Kisco Systems. I know our customers and the service business are in great hands.” Carol Woodbury, Kisco’s IBM i Security SME, ...
- Created on 03 December 2024
- 14. New IBM i Security Features and a Farewell
- (IBM i (OS/400, i5/OS))
- The Db2 and Navigator for i teams have done it again. And Carol bids her readers farewell. By Carol Woodbury As has been the case with most of the recent Technology Refreshes (TRs), Scott Forstie’s ...
- Created on 17 June 2024
- 15. Kisco Systems Acquires DXR Security
- (Security News)
- ... iSeries) computing platform. DXR’s principals, John Vanderwall and IBM i security legend, Carol Woodbury, join Kisco Systems in advisory roles. By Kisco Systems The acquisition marks a significant ...
- Created on 30 April 2024
- 16. Securing IBM i: A Dual Responsibility
- (IBM i (OS/400, i5/OS))
- ... Woodbury IBM’s Responsibility Obviously, if the operating system itself is full of security issues, as a community we’re going to have a hard time securing our data. In fact, it might be impossible ...
- Created on 15 April 2024
- 17. Top IBM i Security Issues of 2024
- (IBM i (OS/400, i5/OS))
- Carol discusses how generative AI, ransomware, and social engineering are affecting the IBM i security landscape. By Carol Woodbury Staying current has been my mantra, but previous articles have focused ...
- Created on 16 February 2024
- 18. Why Cleaning Up Is an Important Part of Your IBM i Security Practice
- (IBM i (OS/400, i5/OS))
- Don’t ignore the risks presented by objects, profiles, and products that are no longer in use. By Carol Woodbury I don’t know about you, but I like to start the year with a fresh slate. I create a ...
- Created on 13 December 2023
- 19. Five IBM i Security Features You May Have Forgotten About
- (IBM i (OS/400, i5/OS))
- Carol reminds readers of several hidden gems that help administrators manage IBM i security more effectively. By Carol Woodbury Every once in a while, I like to refresh readers’ memories about security ...
- Created on 16 October 2023
- 20. The Five Characteristics of Organizations That Don’t Take IBM i Security Seriously
- (IBM i (OS/400, i5/OS))
- Carol discusses the characteristics she’s observed over the years that are indications an organization isn’t taking IBM i security as seriously as it should. By Carol Woodbury I’ve seen the entire ...
- Created on 04 August 2023
- 21. Zero-Trust Security for IBM i
- (IBM i (OS/400, i5/OS))
- Zero-Trust: What it is and what it means for your IBM i security implementation. By Carol Woodbury As is often the case with any technology, the security industry will start to use a term that sounds ...
- Created on 17 July 2023
- 22. Viewing and Managing Authority Collection Using New Navigator for i
- (IBM i (OS/400, i5/OS))
- You can now use the Authority Collection feature of IBM i in graphical form. By Carol Woodbury I’m a huge fan of the Authority Collection feature added in IBM i 7.3 and enhanced in 7.4. But administrators ...
- Created on 17 April 2023
- 23. A Moment with Carol: What Are the Benefits of Pen Testing the IBM i?
- (IBM i (OS/400, i5/OS))
- Security is only as good as the configuration. By Carol Woodbury An IBM i Pen Test proves that your system security is configured properly. Doing an IBM i Pen Test helps you figure out the holes in ...
- Created on 13 April 2023
- 24. Can Security and Artificial Intelligence (AI) Mix?
- (IBM i (OS/400, i5/OS))
- Carol investigates the use of AI and its implications on IBM i Security By Carol Woodbury You can’t read or listen to any business, technical, or security-related news without hearing the term “AI” ...
- Created on 31 January 2023
- 25. IBM i Security Administration and Compliance: Third Edition
- (MC Press Bookstore)
- In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i security. The definitive IBM i security reference, this ...
- Created on 03 January 2023
- 26. IBM i Security Lessons Learned in 2022
- (IBM i (OS/400, i5/OS))
- Carol reflects on the things she’s learned in the past year. By Carol Woodbury When it comes to the end of a year, I like to look back and see how things have changed and what I’ve learned. This article ...
- Created on 19 December 2022
- 27. Getting Started with IBM i Security
- (IBM i (OS/400, i5/OS))
- Carol describes the basics of IBM i security and explains how to manage IBM i security using Navigator for i. By Carol Woodbury If you need a refresher on IBM i security, are just starting out on ...
- Created on 17 October 2022
- 28. Mastering IBM i Security - Technology Overview
- (IBM i (OS/400, i5/OS))
- Before we get into examples of using these technologies, I want to make sure you know how to access them as well as provide some tips for using them. By Carol Woodbury Editor's Note: This article is ...
- Created on 15 September 2022
- 29. Using IBM i Services to Manage Object Authority Settings
- (IBM i (OS/400, i5/OS))
- Modernize the way you find objects that don’t match your security requirements. By Carol Woodbury When clients rework their applications’ security configurations, one step I emphasize is that, once ...
- Created on 16 August 2022
- 30. Carol’s Top Five Favorite Security Enhancements in IBM i 7.5 and 7.4 TR6
- (IBM i (OS/400, i5/OS))
- The latest announcements from IBM contained many security enhancements and changes. Carol describes her faves. By Carol Woodbury An IBM announcement hasn’t contained this many security enhancements ...
- Created on 10 June 2022
- 31. Do You Know What End Users Can Do with IBM i Access Client Solutions?
- (IBM i (OS/400, i5/OS))
- Carol discusses why you should understand the features of IBM i Access Client Solutions (ACS) and why you may not want all users to have access to all features. By Carol Woodbury Don’t get me wrong: ...
- Created on 18 April 2022
- 32. Using IBM i Services to Manage Owned Objects
- (IBM i (OS/400, i5/OS))
- Gain flexibility by using these IBM i Services to manage owned objects. By Carol Woodbury I recently had a client that had a set of profiles that shouldn’t have any owned objects but did. In this ...
- Created on 14 February 2022
- 33. Top 10 IBM i Security Wishes for Christmas and the New Year
- (IBM i (OS/400, i5/OS))
- Carol provides the top 10 actions she wishes people would take to make their organizations more secure. By Carol Woodbury The holidays are upon us, and gifts are being given. I don’t know about you, ...
- Created on 13 December 2021
- 34. Security Considerations for PCs and Mobile Devices
- (IBM i (OS/400, i5/OS))
- The technology enabled by PCs and mobile devices is one of the biggest challenges facing IBM i security administrators. By Carol Woodbury Editor's Note: This article is excerpted from Chapter 10 of ...
- Created on 15 November 2021
- 35. The Principles of Project Management, Part 4
- (Career)
- The Characteristics of a Project By Colleen Garton and Erika McCulloch Editor's Note: This article is excerpted from Chapter 1 of Fundamentals of Technology Project Management A project is an undertaking ...
- Created on 18 October 2021
- 36. Using the Security Features in New Navigator for i
- (IBM i (OS/400, i5/OS))
- Carol takes us on a tour of the security-related parts of the updated Navigator for i interface, which IBM shipped in the latest Technology Refreshes for IBM i V7R3 and V7R4. By Carol Woodbury Start ...
- Created on 18 October 2021
- 37. Controlling Access to SSH on IBM i
- (IBM i (OS/400, i5/OS))
- ... to use SSH. By Carol Woodbury SSH clients are readily available from the Internet, so unless you’re controlling what can be installed on your users’ desktops, an SSH client such as PuTTY can be download, ...
- Created on 12 August 2021
- 38. File Shares: Accessing Objects in the IFS
- (IBM i (OS/400, i5/OS))
- ... organizations define file shares to allow users to map a drive and easily drag and drop documents to or retrieve them from a directory on IBM i. By Carol Woodbury Editor's Note: This article is excerpted ...
- Created on 12 July 2021
- 39. Using the New Security Features in the Latest IBM i Technology Refreshes
- (IBM i (OS/400, i5/OS))
- The TRs for IBM i V7R3 and V7R4 have some very cool stuff. Carol gives you a tour. By Carol Woodbury Yes, once again the IBM i development team has provided us with new features that will help make ...
- Created on 14 June 2021
- 40. Modernize Your IBM i User Profile Management
- (IBM i (OS/400, i5/OS))
- Gain efficiency and flexibility using these new techniques for managing user profiles and their attributes. By Carol Woodbury I realize that it’s hard to change the way you do things when the method ...
- Created on 19 April 2021
- 41. Managing Authorities to IFS Objects
- (IBM i (OS/400, i5/OS))
- To manage the authorities to objects in the IFS, you can use either green-screen CL commands or the Navigator for i interface. By Carol Woodbury Editor's Note: This article is excerpted from chapter ...
- Created on 09 March 2021
- 42. Lessons IBM i Shops Can Learn from the SolarWinds Attack
- (IBM i (OS/400, i5/OS))
- While IBM i was not the direct target, Carol discusses lessons the IBM i community can learn from the SolarWinds attack. By Carol Woodbury The full extent of the SolarWinds attack continues to unfold, ...
- Created on 10 February 2021
- 43. 5 Actions for IBM i Administrators in the New Year
- (IBM i (OS/400, i5/OS))
- Carol provides her suggestions for doing things differently in 2021. By Carol Woodbury With the new year upon us, resolutions are being made. I’m not really a resolution person, but every year I do ...
- Created on 13 January 2021
- 44. IBM i Technology Refreshes and Other Things I’m Thankful for in 2020
- (IBM i (OS/400, i5/OS))
- ... in 2020. By Carol Woodbury One of the people I follow on Instagram started to post the things she was thankful for. They were simple things: her dog, a beautiful sunset, money to buy groceries. These ...
- Created on 08 December 2020
- 45. Using SECTOOLS to Determine Your Current IBM i Security Settings
- (IBM i (OS/400, i5/OS))
- To make informed security decisions that move your company forward, you must first determine the current security settings. By Carol Woodbury Perhaps you’re new to IBM i security or security has been ...
- Created on 06 November 2020
- 46. The Case for Using Authorization Lists to Secure IBM i Objects
- (IBM i (OS/400, i5/OS))
- Carol explores the pros and cons of using authorization lists to secure IBM i objects. By Carol Woodbury Authorization lists (Autls) are a tool provided by the operating system that allows you to simplify ...
- Created on 13 October 2020
- 47. How Can I Tell Whether All the Connections to My IBM i Are Secure?
- (IBM i (OS/400, i5/OS))
- While it’s easy enough to know whether my own connection to IBM i is secure—that is, encrypted—how can I tell whether all connections are encrypted? By Carol Woodbury Some organizations have a requirement ...
- Created on 10 September 2020
- 48. Is Authority Collection a Replacement for the Audit Journal?
- (IBM i (OS/400, i5/OS))
- ... By Carol Woodbury During a class I was teaching, someone asked if they should stop auditing the commands a user was running and enable Authority Collection to log users’ activity instead. Since her ...
- Created on 11 August 2020
- 49. Practical SQL: SQL Monitor Part 1, Using Identities to Store Big Data
- (SQL)
- ... exist to track this sort of activity. Perhaps the most thorough is to use exit points; Carol Woodbury wrote an excellent introductory article on the topic. However, for this purpose I considered exit points ...
- Created on 03 August 2020
- 50. If I Had Only 5 Minutes, I’d Check These 5 IBM i Security Configurations
- (IBM i (OS/400, i5/OS))
- If you’re pressed for time, this quick review can help you verify that your security configuration hasn’t gone totally sideways. By Carol Woodbury It’s rare that people have extra time. And while most ...
- Created on 08 July 2020