LATEST CONTENT
The IBM i Security enhancement in IBM i 7.6 that should draw your attention the most, is the enablement of MFA. Why is this so significant? This article explores how to configures MFA on IBM i as well as why you’ll still want to consider vendor MFA solutions after you upgrade.
Just like IBM i 7.5 brought many new IBM i Security features and a re-emphasis on IBM’s commitment to secure by design, so does IBM’s recent announcement of version 7.6. Here, Carol Woodbury explores the highlights of what’s new and changed in the area of IBM i Security.
An effective way to reduce the risk of suffering an outage from malware is to stop sharing directories containing critical data and/or shares that expose large portions or the entire system (such as a share to root (‘/’), /QOpenSys or /QSYS.LIB.)
You can significantly reduce the risk of having your IBM i affected by malware (including ransomware) simply by limiting which users can map a drive (that is, use a file share to map) to your systems.
The benefit of using a data mart for audit journal information is to keep audit journal information on the system for a longer time than you typically could when leaving the information in audit journal receivers. IBM i 7.5 TR 5 and 7.4 TR11 enhance your ability to be even more selective about what information you have in the data mart.
IDS is a built-in IBM i security feature. It is designed to detect and notify in or outbound attempts to hack, disrupt or deny service to the system. It is a socket-level feature that can be complicated to configure and tune. This article explores a very basic configuration to alert for intrusion events.
Let's take a look at security enhancements in the IBM technology refreshes to be delivered in Nov 2024
DORA is a new European Union regulation called the “Digital Operational Resilience Act.” It was adopted in December 2022 and is enforceable as of January 17, 2025. Kisco Systems can help regulated companies comply with DORA.