• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Adventures In IBM i Encryption

    September 17, 2018 Tom Woolaway

    Are you impacted by the New York Cybersecurity Requirements for Financial Services Companies? If you are a banking, insurance, or brokerage firm that uses a license to operate in New York, these regulations require specific cybersecurity practices be implemented. Section 500.15 Encryption of Nonpublic Information requires encryption at rest of non-public information. Or perhaps you have other reasons to want to encrypt your IBM i drives.

    This article focuses on encryption at rest of the disk drives of IBM i systems using 57XX-SS1 Option 45 – Encrypted ASP Enablement, where you end up with an unencrypted system ASP 1 and …

    Read more
  • Why Encryption Is Not A Silver Bullet

    October 2, 2017 Alex Woodie

    While there is a temptation to view database encryption as the ultimate form of security, there are a variety reasons why the technology should not be relied upon as the main means to protect your valuable DB24i data. We talk with former IBMer Bruce Bading, who wrote the book on IBM i security assessments, to get the dirty details.

    In the wake of the Equifax hack, several important questions have gone unanswered: Did the credit giant encrypt its data, and if so, how did hackers end up with 143 million records? With multiple government investigations – and many more civil …

    Read more
  • Evaluating Your IBM i Encryption Options

    September 25, 2017 Alex Woodie

    In the wake of the Equifax breach, companies are taking a hard look at their security practices, including the use of encryption that renders data unreadable. While database encryption is not a panacea for securing a Db2 for i database – especially if there are other vulnerabilities in an IBM i system – it can play an important role in protecting sensitive data from leaking out into the world.

    Encryption has emerged as a topic in the wake of the massive data breach at Equifax, which lost critical data like names, addresses, and Social Security numbers for 143 million Americans, …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
  • You Are Much More Than Power Systems, And So Are We
  • Startup Seeks The “Golden Path” for IBM i Modernization
  • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
  • IBM i PTF Guide, Volume 28, Number 15
  • Bob 1.0 Users Bugged By Lack Of One Feature
  • Here Come The AI-Based Code Modernization Offerings
  • Guru: Cohesion First – What A Procedure Should Be Responsible For
  • IBM Offers Trade-Ins On Storage To Grease The Upgrade Skids
  • IBM i PTF Guide, Volume 28, Number 14

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle