• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Thoroughly Modern: Good Security Is Just As Important As Good Code

    June 13, 2022 Pauline Brazil Ayala

    Can my IBM i really be hit with a virus? Can it be hit with ransomware?

    These are the questions I regularly get from clients as a security expert with more than 20 years of experience. With the pervasiveness of these ransomware threats and sophisticated cyberattacks that we’re seeing in recent times, it only makes sense that we pay close attention to these threats.

    Security on the IBM i is a complex topic, and it is not one that is easily tackled with a few bullet points and tweaks of systems settings. Just like programming on the platform, for that …

    Read more
  • Groundhog Day For Malware

    May 11, 2022 Steve Pitcher

    Say it with me: IBM i is NOT immune to malware.

    A couple of years ago, I wrote a piece called The Real Effects of Malware on IBM i. I thought it laid out a pretty fun, yet frighteningly serious, story of having an argument with a gentleman on Facebook regarding what’s IBM i fact vs fiction regarding malware and how myself and my iTech Solutions colleague Nathan Williams proved it out with some homemade malware and hosed a test system in the process. It really just says everything it needs to.

    So a few weeks ago I’m on …

    Read more
  • In The IBM i Trenches With: LaserVault

    March 21, 2022 Timothy Prickett Morgan

    When somebody says they have been doing the same job for three or four decades, that is a big deal in the 21st century because that kind of long-term employment is just not something anyone counts on. In the OS/400 and IBM i market, such constancy and longevity is, well, normal. Unremarkable. Expected. Good.

    So it is with Brad Jensen, the founder and chief executive officer of Electronic Storage Corporation, a company that is perhaps best known for its LaserVault virtual tape library software, but since the company was founded in 1989 in Tulsa, Oklahoma, it …

    Read more
  • IBM i Community Predictions for 2022, Part 2

    January 12, 2022 Alex Woodie

    The new year is upon us, which means it’s time for predictions. We continue where we left off on Monday with our second installment of predictions from the IBM i community.

    The way Fresche Solutions Chief Product Officer Marcel Sarrasin sees it, 2022 will be a period of heightened competition in the business jungle.

    “Technology advancements and changing markets will drive new competitive threats in 2022, creating the urgent need for new digital solutions to help companies thrive, survive and grow,” Sarrasin says. “Focus will be on new IT products and applications that will deliver improved business processes, pave the …

    Read more
  • Ransomware Attacks Hit Closer To Home

    July 12, 2021 Alex Woodie

    Fifteen hundred organizations around the world had their data locked up in the latest ransomware attack, including grocery store chains and schools. It’s unclear if any IBM i shops were included in the attack, which a Russian hacking group claimed credit for. But it’s clear that ransomware is a growing threat to all organizations, including IBM i shops.

    On July 2, as hundreds of millions of Americans hunkered down for the long Independence Day holiday weekend, hackers using the REvil were just getting started. The Russian-affiliated hacking group had already done the hard work of exploiting a five-year-old security flaw …

    Read more
  • Malware Threats and Cyber-Recovery on IBM i

    May 26, 2021 Brian Barth

    Cyber threats have evolved from the traditional vectors of theft and direct attacks to more financial driven cyber destruction and extortion, especially via ransomware. Hospitals, manufacturers, universities and financial institutions have all been attacked in the last year, and the rate of attacks is increasing as networks become more accessible to support remote workers. The Colonial Pipeline attack has demonstrated that even the critical infrastructure that supports our supply chains is not invulnerable.

    In 2021, more than three quarters of attacks are financially motivated, and over half of those attacks are ransomware – an attack in which files are typically …

    Read more
  • Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    May 17, 2021 Alex Woodie

    The ransomware outbreak hit home for millions of Americans last week when attackers shut down a major East Coast pipeline as well as a hospital network on the West Coast. For IBM i shops, the events are a potent reminder to re-evaluate network security and data protection systems to ensure they’re resilient from attack.

    You could be forgiven for thinking you were watching an episode of Mr. Robot last week as news spread of the shutdown of Colonial Pipeline network, which provides 45 percent of the gasoline for the entire East Coast of the United States through 5,500 miles of …

    Read more
  • Is Information Overload Hurting IBM i Security?

    September 28, 2020 Alex Woodie

    What is wrong with IBM i security? If you look at surveys and reports, you would be hard pressed to find something that is not broken. From excessive authority and ransomware, to exit programs and default passwords, it can feel as if IBM i servers are rife with security failures.

    IBM i shops are certainly aware of the security shortcomings. Security has been rated the number one concern in each of the past two IBM i Marketplace studies conducted by HelpSystems. In the most recent report, 77 percent of respondents rated security a top concern, the highest percentage …

    Read more
  • Maxava Hits Multiple Targets With The Same HA Arrow

    September 16, 2019 Timothy Prickett Morgan

    Downtime is never a good thing for any business, except maybe for those who sell high availability clustering and disaster recovery software for a living. And to be honest, these companies explicitly want to keep the downtime and the recovery time to the smallest period as possible. The fear of downtime should be enough to motivate us all to replicate out systems.

    But sometimes, just having two systems in a high availability cluster is not enough. Some companies need belts with their suspenders, and maybe even a bunch of different belts because they really can’t be down. To that end, …

    Read more
  • Raz-Lee Offloads Virus Scanning from IBM i with ICAP

    May 15, 2019 Alex Woodie

    Raz-Lee Security is providing IBM i shops another option when it comes to anti-virus software by offering an ICAP client that offloads CPU-intensive virus scanning activities to an external server. The new solution is being sold as an extension to Raz-Lee’s existing Anti-Virus solution.

    While the IBM i operating system is essentially immune to PC viruses, they still pose a threat to IBM i shops, which typically have a smattering of Windows desktops and servers on the network. The problem is that Windows viruses (and assorted other malware) can infect the IBM i server’s Windows-like Integrated File System (IFS), where …

    Read more

Previous Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26
  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle