• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says

    August 3, 2022 Alex Woodie

    Improving cybersecurity continues to be the number one overall priority for IT teams at midsize companies going into the second half of the year, but automation and cloud migrations are not too far behind, according to a recent study from Kaseya. Legacy concerns also are viewed as a drag on productivity.

    Kaseya last month published its 2022 IT Operations Report, in which it surveyed 1,877 IT professionals from around the world in April to learn about the top priorities and challenges where they work. The company surveyed only employees at organizations with fewer than 3,000 employees, which is Kaseya’s cut-off …

    Read more
  • IBM i Integration Elevates Operational Query and Analytics

    May 16, 2022 Bill Langston

    Modernization, SQL, RPG, open source, cybersecurity, resilience, compliance, clouds, and AI are the trending topics in enterprise technology. As a result, IT professionals can easily overlook and undervalue software that enables real-time, operational query and analytics.

    In contrast, managers and mid-level staff in accounting, logistics, inventory, sales, customer service, and other departments still place a high value on data access and often wish their IT team could do more to help. Collaboration is the key, because your company isn’t realizing the potential of operational query and analytics if you have narrowly defined it as a dashboard and ad hoc file …

    Read more
  • Guru: IBM i Unauthenticated Access

    April 25, 2022 Bruce Bading

    One of the greatest threats to any network, host, or server is unauthenticated access where an attacker can gain local or remote access with no credentials that can lead to a Critical rating with the following descriptions (CVSS v3.1 User Guide (first.org).

    Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)

    Integrity Impact Complete (There is a total compromise of system integrity, and a complete loss of system protection resulting in the entire system being compromised.)

    Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render …

    Read more
  • Guru: SIEM Is Only Part Of IBM i Cybersecurity

    March 28, 2022 Bruce Bading

    Many times, we hear from IBM i business owners that their SIEM – that’s short for Security Information and Event Management – is their cybersecurity solution for the IBM i. But that can’t be true, and I want to explain why it is part of the security shield but certainly not all of it.

    Let’s start with SIEMs and how they fit into cybersecurity frameworks. SIEM is mentioned in the PCI appendix, but not once in the core of the 250+ PCI DSS requirements, likewise, the NIST Cybersecurity Framework lists event monitoring as one of the 100s (1/100s) of NIST …

    Read more
  • Hit A Fiduciary Home Run With A Backup, DR, Cybersecurity Triple Play

    October 4, 2021 Jim Kandrac

    The old adage that the only secure computer is one that is not networked to anything has never been more true; however, it is also irrelevant even if it is funny. No computer can exist in a vacuum and is only useful if it is connected to other machines – and potentially lots of other machines. The level of malicious activity out there on the networks of the world has never been higher, and you had better get used to the idea that the situation is going to get worse every year, and the IBM i platform is absolutely …

    Read more
  • How IBM i Fits Into a Zero-Trust Security Framework

    July 19, 2021 Alex Woodie

    One of the hot new trends in cybersecurity these days is the zero-trust security model. Instead of implicitly trusting network traffic behind the firewall, zero-trust demands that traffic have explicit permission to be there. But how does that model work with the strange beast known as IBM i? IT Jungle recently sat down with PJ Kirner, the CTO and co-founder of zero-trust software provider Illumio, to find out.

    Illumio is an eight-year-old venture-backed startup based in Sunnyvale, California, that is working in the field of zero-trust security. It develops an offering, called Illumio Core, that allows companies to begin implementing …

    Read more
  • Security Posture Mixed As Feds Say ‘Shields Up’

    January 14, 2019 Alex Woodie

    “Raise your shield.” That’s the message the Federal Government sent to American businesses last week as part of a new cybersecurity awareness campaign. But according to a recent survey of security professionals by Syncsort, the majority of enterprises, including IBM i shops, are confident in the security protections that are already in place. The big question: Have they actually done enough?

    The National Counterintelligence and Security Center (NCSC) kicked off a new security awareness campaign last week called “Know the Risk, Raise Your Shield.” The NCSC says that foreign intelligence entities are actively targeting information, assets, and technologies” that are …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power10 Midrange Machine: The Power E1050
  • IBM Puts The Finishing Touches On PowerHA For IBM i 7.5
  • Guru: Regular Expressions, Part 2
  • Get Your Security Education, And Not From The School Of Hard Knocks
  • IBM i PTF Guide, Volume 24, Number 33
  • Power10 Entry Machines: The Power S1024 And Power L1024
  • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
  • Big Blue Unveils New Scalable VTL For IBM i
  • As I See It: Thank God It’s Thursday
  • IBM i PTF Guide, Volume 24, Number 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle