• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Adventures In IBM i Encryption

    September 17, 2018 Tom Woolaway

    Are you impacted by the New York Cybersecurity Requirements for Financial Services Companies? If you are a banking, insurance, or brokerage firm that uses a license to operate in New York, these regulations require specific cybersecurity practices be implemented. Section 500.15 Encryption of Nonpublic Information requires encryption at rest of non-public information. Or perhaps you have other reasons to want to encrypt your IBM i drives.

    This article focuses on encryption at rest of the disk drives of IBM i systems using 57XX-SS1 Option 45 – Encrypted ASP Enablement, where you end up with an unencrypted system ASP 1 and …

    Read more
  • Why Encryption Is Not A Silver Bullet

    October 2, 2017 Alex Woodie

    While there is a temptation to view database encryption as the ultimate form of security, there are a variety reasons why the technology should not be relied upon as the main means to protect your valuable DB24i data. We talk with former IBMer Bruce Bading, who wrote the book on IBM i security assessments, to get the dirty details.

    In the wake of the Equifax hack, several important questions have gone unanswered: Did the credit giant encrypt its data, and if so, how did hackers end up with 143 million records? With multiple government investigations – and many more civil …

    Read more
  • Evaluating Your IBM i Encryption Options

    September 25, 2017 Alex Woodie

    In the wake of the Equifax breach, companies are taking a hard look at their security practices, including the use of encryption that renders data unreadable. While database encryption is not a panacea for securing a Db2 for i database – especially if there are other vulnerabilities in an IBM i system – it can play an important role in protecting sensitive data from leaking out into the world.

    Encryption has emerged as a topic in the wake of the massive data breach at Equifax, which lost critical data like names, addresses, and Social Security numbers for 143 million Americans, …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • To Comfort The Afflicted And Afflict The Comfortable
  • How FalconStor Is Reinventing Itself, And Why IBM Noticed
  • Guru: When Procedure Driven RPG Really Works
  • Vendors Fill In The Gaps With IBM’s New MFA Solution
  • IBM i PTF Guide, Volume 27, Number 27
  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle