While you've been busy outfitting your network with the latest and greatest firewalls, encryption, intrusion detection, and intrusion prevention tools, hackers have been busy as well—inventing new ways to compromise your network and exploit the valuable resources of your enterprise.
Considering implementing PHP on your System i? Already done so? Make sure you are up-to-date on some of the key security issues that PHP can represent with this brief IBM Redbook Wiki that provides a great starting overview of PHP on System i.
In Chinese philosophy, balance is achieved between yin—the sustaining principal—and yang—the creative principal. When it comes to System i messaging, the same balance can enhance your operations and bring success and prosperity to your organization. (MC Press Online)
If 2006 was any indication, the malware landscape won't be getting better any time soon. New threats are emerging at the fastest rate ever, and the potential consequences are alarming. The traditional view of System i as an impenetrable island is a recipe for disaster. (MC Press Online)
Parsing SQL statements using transaction security is time-consuming and requires constant maintenance.Treating requests as "objects" and eliminating the need to examine SQL statements can improve your security and save you time and money. (MC Press Online)
The lure of a cheap elixir is a risky temptation, but while free or inexpensive anti-virus may seem like an adequate solution, it is not. Take a look at the realities of open source anti-virus solutions and how they can compromise your security. (MC Press Online)
Security applications and monitoring/notification applications often come from different vendors, and as a result it is easy to view them as distinct and separate. However, the two go hand in hand, and monitoring/notification products play a significant role in security. (MC Press Online)
The Integrated File System is critical to the iSeries' ability to operate in a heterogeneous network. Since the IFS exists on every iSeries, it makes a perfect chink in the armor for hackers to exploit. Learn how to manipulate its security features and more. (System iNEWS)
It's no secret that vendors sometimes play around with OS/400 and i5/OS to achieve functionality beyond that supported by a given OS version. What is less widely understood is that this practice of "patching" programs can introduce instabilities and security exposures. (MC Press Online)
It's impossible to use a computer today without being surrounded by threats from viruses, hackers, and malicious code. There are many fronts in the battle to protect our sensitive information. Find out how to protect yourself and your assets. (MC Press Online)
Not so long ago, viruses were just little annoyances that come along with using a computer. But over the past few years, they’ve begun to target specific industries and serve as tools for criminals. Today a layered approach is the only way to truly protect your valuable assets. (MC Press Online)
This 8-page Essential Guide, published as part of the October 2005 issue of iSeries NEWS magazine, offers an extensive look at iSeries security. An indispensable resource for any iSeries manager or operator. (System iNEWS)