• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Get Your Security Education, And Not From The School Of Hard Knocks

    August 15, 2022 Timothy Prickett Morgan

    If there is one thing that is consistently hard for human beings, it is learning from the experience of others. When it comes to IBM i security, it is safe to say that many IBM i shops are in over their heads and they have to get all of the help they can to try to batten down the hatches against the many threats that all systems – even the IBM i platform – can be the victim of these days.

    That’s why IBM i security software vendor Raz-Lee has put together a series of webinars in September to help customers get a handle on the big issues they face when it comes to securing their IBM i systems. They are as follows:

    • September 5 – Using MFA to Secure Sign On for IBM i: This webinar will discuss the dangers of social engineering and its prevention, including password brute-force attacks, and the benefits of enabling Multi Factor Authentication at IBM i with Raz-Lee iSecurity MFA
    • September 6 – Zero Trust and Encryption at IBM i: What are the core principles of the zero trust model? We will talk about the stages of implementing zero trust and how data encryption is the first step with the help of Raz-Lee iSecurity Field Encryption & PGP Encryption
    • September 7 – Surviving a Combined Attack: This discussion will cover the combined attack techniques and ransomware types that could reach your IBM i data, and, more importantly, how to stay safe thanks to software like Raz-Lee iSecurity Antivirus & Anti-Ransomware
    • September 12 – Zero Trust and Exit Points at IBM i: Zero trust principles, concepts, and misconceptions. This discussion will detail IBM i exit points and how to fix this security issue with Raz-Lee iSecurity MFA & Firewall.
    • September 13 – Zero-Day Attack Prevention: What is the real meaning of a Zero Day attack and how can you be ready for this kind of security breach? This webinar focuses on prevention using tools from Raz-Lee Anti-Ransomware & MFA & Firewall, making a Zero Day attack stop as soon as it begins.
    • September 14 – Data Loss Prevention over IBM i: Learn about data loss prevention, compliance, and how to enable policies and procedures with Raz-Lee iSecurity Audit.

    You can sign up for any and all of these webinars at this link.

    RELATED STORIES

    Raz-Lee Simulates Ransomware Attack on IBM i

    Raz-Lee Debuts Anti-Ransomware For IBM i

    Assessing The Ransomware Threat On IBM i

    Ransomware Raises The Stakes For Data Insurance

    WannaCry: What IBM i Pros Need To Know

    Assessing The Ransomware Threat On IBM i

    Keeping Ransomware Out of the VAULT

    Top 11 Ways to Protect Your IBM i from Insider Threats

    Verizon Outlines Disturbing AS/400 Breach At Water District

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Join us for this webinar where we’ll showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM i PTF Guide, Volume 24, Number 33 Guru: Regular Expressions, Part 2

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 55

This Issue Sponsored By

  • Fresche Solutions
  • TL Ashford
  • ProData
  • ARCAD Software
  • Raz-Lee Security
  • WorksRight Software

Table of Contents

  • IBM’s Competitive Analysis For Power10 Entry Machines
  • Power10 Midrange Machine: The Power E1050
  • IBM Puts The Finishing Touches On PowerHA For IBM i 7.5
  • Guru: Regular Expressions, Part 2
  • Get Your Security Education, And Not From The School Of Hard Knocks
  • IBM i PTF Guide, Volume 24, Number 33

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle