iSeries system and application security

  • November 08, 2006 08 Nov'06

    System i security: It's people

    A recent survey by iSeries security software company PowerTech found that it isn't the hardware or software causing security breaches on System i. It's improper password implementation and other people security issues.

  • April 12, 2006 12 Apr'06

    IBM unveils SecureBlue

    IBM unveiled a major security overhaul Monday, saying it will "greatly increase" the security of consumer products, medical devices, government applications and digital media. Developed by IBM Research and codenamed "SecureBlue," the new technology ...

  • May 19, 2005 19 May'05

    PowerTech acquires TriAWorks

    iSeries security company buys SSO software vendor to take advantage of IBM's Enterprise Identity Mapping capabilities.

  • December 29, 2004 29 Dec'04

    Linux, security skills projected hot for 2005

    IT workers looking to improve their standing in the job market should look to open source, Web services and security-related skill and certification sets, according to recent research.

  • August 30, 2004 30 Aug'04

    iSeries security -- Fact or Fiction?

    Security expert Carol Woodbury provides advice to's members on a regular basis. Do you feel you're also a iSeries security guru? Test your knowledge against some of Carol's recent Q&As below. Mark each question with either a True or ...

  • August 30, 2004 30 Aug'04

    Answers to iSeries security -- Fact or Fiction?

    Answers to iSeries security -- Fact or Fiction?

  • July 12, 2004 12 Jul'04

    Word search #3: iSeries security

    Are you a secure enough iSeries user to take this word search challenge? Test your skills at our latest iSeries word search puzzle. Keep your eyes open, you never know who's looking over your shoulder or system!

  • June 02, 2004 02 Jun'04

    Password -- How to specify numeric expert Ken Graap shares this tip on how to specify a numeric password.

  • May 14, 2004 14 May'04

    iSeries authority -- How the system checks it

    When a user attempts to perform an operation on an object, the system verifies that the user has adequate authority for the operation. The system first checks authority to the library or directory path that contains the object. If the authority to ...

  • May 03, 2004 03 May'04

    Virus-scanning engine will ship with i5/OS

    IBM has a new strategy for securing the iSeries, and that means users can look forward to free anti-virus software samples.

  • February 02, 2004 02 Feb'04

    iSeries immune to Mydoom? Sort of

    The new variant of the Mydoom worm is said to have hit numerous iSeries shops recently. But iSeries experts say an attack would be rare.

  • May 19, 2003 19 May'03

    Symantec offers firewall for Linux on the iSeries

    Symantec unveils a firewall for the iSeries 270 running Linux. The appliance runs directly on one of the iSeries logical partitions (LPAR), instead of on a dedicated server.

  • March 08, 2000 08 Mar'00

    Slammer or glamour for DOS hackers?

    Respondents to a poll showed little mercy toward those responsible for the recent denial-of-service attacks on several high-profile Web sites. In fact, some of the poll's participants were downright bloodthirsty.

  • March 01, 2000 01 Mar'00

    System security in an unsecured world

    The only truly secure computer is one that's turned off and other truths administrators should understand about security

    By Kate Evans-Correia, news editor,

    Making system security a number one priority should be a ...

  • January 31, 2000 31 Jan'00

    Keep your AS/400 safe and secure

    By Kate Evans-Correia, news editor,

    Any AS/400 professional worth his weight understands the importance behind securing the data on AS/400s. But, security for these issues will present even more of a challenge as the AS/400 ...