• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Adventures In IBM i Encryption

    September 17, 2018 Tom Woolaway

    Are you impacted by the New York Cybersecurity Requirements for Financial Services Companies? If you are a banking, insurance, or brokerage firm that uses a license to operate in New York, these regulations require specific cybersecurity practices be implemented. Section 500.15 Encryption of Nonpublic Information requires encryption at rest of non-public information. Or perhaps you have other reasons to want to encrypt your IBM i drives.

    This article focuses on encryption at rest of the disk drives of IBM i systems using 57XX-SS1 Option 45 – Encrypted ASP Enablement, where you end up with an unencrypted system ASP 1 and …

    Read more
  • Why Encryption Is Not A Silver Bullet

    October 2, 2017 Alex Woodie

    While there is a temptation to view database encryption as the ultimate form of security, there are a variety reasons why the technology should not be relied upon as the main means to protect your valuable DB24i data. We talk with former IBMer Bruce Bading, who wrote the book on IBM i security assessments, to get the dirty details.

    In the wake of the Equifax hack, several important questions have gone unanswered: Did the credit giant encrypt its data, and if so, how did hackers end up with 143 million records? With multiple government investigations – and many more civil …

    Read more
  • Evaluating Your IBM i Encryption Options

    September 25, 2017 Alex Woodie

    In the wake of the Equifax breach, companies are taking a hard look at their security practices, including the use of encryption that renders data unreadable. While database encryption is not a panacea for securing a Db2 for i database – especially if there are other vulnerabilities in an IBM i system – it can play an important role in protecting sensitive data from leaking out into the world.

    Encryption has emerged as a topic in the wake of the massive data breach at Equifax, which lost critical data like names, addresses, and Social Security numbers for 143 million Americans, …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle