PowerNews

PowerNews Newsletter Archive

2014: February | January
2013:
December | November | October | September | August | July | June | May | April | March | February | January
2012:
December | November | October | September | August | July | June | May | April | March | February | January
2011:
December | November | October | September | August | July | June | May | April | March | February | January
2010:
November | October | September | August | July | June | May | April | March | February | January
2009: December | November | October

February 2014 View full newsletter

  • Why You Shouldn’t Worry About Hackers
  • Setting Up Switch Pairs with Authority Broker
  • What’s Inside McAfee’s Latest Scan Engine?
  • BEYOND POWER7: IBM i Trends & Tech Tour
  • What You Need When You Call
  • Q&A: Can Network Security be replicated to an IASP for PowerHA?
  • Q&A: What does the automatic balancing feature in PowerAdmin do?

January 2014 View full newsletter

  • The Top 3 IT Security Trends of 2013
  • Resolve to Spend Less This Year on IBM i Security
  • Support Corner
  • Q&A: Can Password Self Help users change their passwords or change their questions and answers?
  • Q&A: How do I start DataThread on a mirrored target machine?

December 2013 View full newsletter

  • Writing a Secure IBM i Application (and 13 ways to check it twice)
  • A Guard at Every Door
  • Log IBM i Events with Any SIEM
  • Q&A: How are the journal receivers for Command Security managed and removed from the system?
  • Q&A: Are the questions in Password Self Help encrypted?

November 2013 View full newsletter

  • The Great Fraud Migration
  • Say Hello to my F-I-M
  • Avoid Rookie Mistakes in Job Scheduling
  • Q&A: Is there a way for Compliance Monitor to track when a specific user signs on to the system?
  • Q&A: Where are Network Security entries stored?

October 2013 View full newsletter

  • Houston, we have a problem.
  • Managing your Audit Data
  • 40 Minutes, $70 a Call
  • Q&A: Interact isn’t showing me audit events, even though I know they are occurring. What am I doing wrong?
  • Q&A: I would like to run PowerTech’s free Compliance Assessment on a machine that has Network Security active. What servers will it access when it runs?

September 2013 View full newsletter

  • IT Security's Next Gold Mine
  • Enhanced Command Security
  • Uncover the Secrets of Advanced Query/400
  • Q&A: I need to change the passwords for PLCMADM and PLCM2ADM in Compliance Monitor on a regular basis. How do I do that?
  • Q&A: Does Command Security need anything to be started after an IPL?

August 2013 View full newsletter

  • Your Biggest Threat Since Edward Snowden
  • Empower Your Security Monitor to Interact
  • Get Control of Your Power Users
  • Q&A: How do I solve the problem in which Authority Broker screen captures aren't visible in the product?
  • Q&A: How do I set up Command Security to control the STRSQL command?

July 2013 View full newsletter

  • Your Seamless Upgrade
  • The Other Side of Disaster Recovery
  • Manage IBM i Messages Your Way
  • Q&A: We license several of the PowerTech products. Do you have a list of the most common product commands?

June 2013 View full newsletter

  • The DDoS Deception You Need to Know About
  • Thrifty Ways to Audit Your i
  • How to Maintain Your Data Integrity
  • Q&A: How do I track interactive sign-on events for QSECOFR (or others)?

May 2013 View full newsletter

  • State of IBM i Security Study 2013: Interview with the Author
  • User Onboarding with PowerAdmin
  • Exclusive White Paper: IBM i User Provisioning
  • Q&A: Is there a fast way in Network Security to limit the entries created by my application profiles?
  • Q&A: Can I send Network Security entries somewhere other than QAUDJRN?

April 2013 View full newsletter

  • Godzilla’s IBM Hack and Other Bizarre Breaches
  • Setting up Switch Pairs with Authority Broker
  • Monitor IBM i Security and Compliance with SEQUEL and PowerTech
  • Q&A: How can Compliance Monitor show me who signs on my system?
  • Q&A: I can’t find a deleted user profiles report in CM. What can I do?

March 2013 View full newsletter

  • Your Biggest Challenge to IBM i User Onboarding
  • 5 Ways to Satisfy COBIT
  • Gone But Not Forgotten—John Earl Memorial Fund
  • Q&A: I’m trying to run a Compliance Assessment in IE 9, but the report comes back blank. What am I doing wrong?
  • Q&A: I really love your new Command Security solution! Are there any commands that it can’t monitor?

February 2013 View full newsletter

  • BYOD: Problems, Practices, and Solutions
  • “Black Hole” Explorer
  • 30 Year Milestone for Smarter Data Centers
  • Q&A: Is it possible to have a process that deletes old Compliance Monitor assessments and logs from both my Consolidator and Endpoints?
  • Q&A: Can I save my report with custom filters in Compliance Monitor, and run it again?

January 2013 View full newsletter

  • 2012 in Review: When The Cybercriminals Win
  • The Other Side of Disaster Recovery
  • Your Disk Space Security Threat
  • Q&A: Some of my Authority Broker reports are blank, even though I know there was activity during the requested time period. What would cause this?
  • Q&A: How can I use PowerTech Network Security to globally prevent users from updating data via Open Database Connectivity (ODBC)?

December 2012 View full newsletter

  • Keeping Critical Assets Secure In the Cloud
  • Compliance Reporting: Home for the Holidays!
  • Your Biggest Threat for Security Breach
  • Q&A: Can Compliance Monitor show me when users sign on to the system?
  • Q&A: Do I need to be on an authorization list to run Authority Broker reports?

November 2012 View full newsletter

  • Does Your Business Trust Its Data?
  • Help! I Forgot My IBM i Password (Again!)
  • Interacting with Interact
  • Q&A: Is it possible to know what Compliance Assessment creates on our system before installing it? Can remove these items after the assessment is finished?
  • Q&A: Some of my Authority Broker reports are blank, even though I know there was activity during the requested time period. What would cause this?

October 2012 View full newsletter

  • The Consolidation Revolution
  • How to Make Your Auditor Love You? DataThread.
  • Which Performance Metrics Are You Ignoring?
  • Q&A: What is the best way to produce an object authorities report for a specific library and object type using Compliance Monitor?

September 2012 View full newsletter

  • CSI: Your Data
  • Empower Your Security Monitor to Interact
  • Learn the Secrets of Advanced Query/400
  • Q&A: I upgraded to Network Security version 6 and imported my security rules. How do I remove the old product libraries?

August 2012 View full newsletter

  • Security in Today’s World: Protecting Your Data, Protecting Your Business
  • Use Profile Swaps for Safe Authority Inheritance
  • Arm Your IBM i Servers with Native Protection Against Malicious Code
  • Q&A: Can Compliance Monitor show me when someone creates new user profiles?
  • Q&A: I need to run some security-related reports. Do you have any suggestions?

July 2012 View full newsletter

  • Beware the Auditing and Security Free Lunch
  • How To Maintain Your Data Integrity
  • IBM i Scheduling Survival eGuide
  • Q&A: How do you set up a “user rule” in Network Security to allow a transaction or event?
  • Q&A: Can Compliance Monitor show me when someone creates new user profiles?

June 2012 View full newsletter

  • Getting Started with PCI and Why Every Company Should Be in Compliance
  • IBM i Message Management and Resources Monitoring eBook
  • PowerTech Releases PowerAdmin
  • Q&A: Is there a way to track interactive signon events for QSECOFR (or other user profiles)?
  • Q&A: Can Authority Broker notify my system administrator at the start of every role swap?

May 2012 View full newsletter

  • PowerTech Releases 2012 State of IBM i Security Study
  • I've Got *ALLOBJ Authority And I'm Not Afraid To Use It—Part 2
  • 2012 Help/Systems User Conference—Sharpen Your Skills at the Solutions Summit
  • Q&A: We want to do some disaster recovery testing. How can we start DataThread on a mirrored target machine?
  • Q&A: How can I move Authority Broker to a new system?

April 2012 View full newsletter

  • I Have All Object Authority And I'm Not Afraid To Use It!
  • Monitor, Capture, and Send Log Events With PowerTech Interact
  • Q&A: How do I back up Interact?
  • Q&A: How do I configure a new install of Interact and IP addresses?

March 2012 View full newsletter

  • The Road To Security Starts with a Compliance Assessment
  • Scan Your System Security in Just 10 Minutes
  • Six Areas of Configuration
  • Command Access Can Bring Unexpected Consequences
  • Q&A: What are libraries @@$PTABPTF, PABPLPTF, and PABPTF0003?

February 2012 View full newsletter

  • Remember the IFS
  • Audit Tested & Audit Approved Instant Authority!
  • Q&A: Deleting old Compliance Monitor assessments and logs

January 2012 View full newsletter

  • Generate and Distribute Audit Reports Automatically
  • Recorded Webinars: IBM i Viruses: Fact or Fiction
  • PowerTech Dashboards Using SEQUEL Software
  • Tips/Q&A: A reason for blank Authority Broker reports
  • Tips/Q&A: Will Compliance Monitor 3 run on my system?
  • Trivia: Name two things that a user profile inherits from its group profile.

December 2011 View full newsletter

  • Security Breaches—When, Not If
  • Control Freak Trivia

November 2011 View full newsletter

  • Defining a Batch Assessment in Compliance Monitor 3
  • Q&A: Deleting Old Network Security Product Libraries.

October 2011 View full newsletter

  • What Happens in Vegas... Is (Hopefully) Shared Back Home!
  • Beware of Skimming—It's Closer Than You Think
  • Q&A: How to know what Compliance Assessment creates on your system and how to move it when finished.

September 2011 View full newsletter

  • Batch Scheduling Enhances Compliance Monitor 3
  • When Good Guys Turn Bad
  • Q&A: Can I save my report with custom filters in Compliance Monitor, and run it again?

August 2011 View full newsletter

  • PowerTech Releases Command Security
  • Commands Never Die! Stay in Command of Your Command Line
  • Register for the IBM i Security Event of the Year
  • Q&A: Can I transfer SecurityAudit from one system to another for D/R testing?

July 2011 View full newsletter

  • Help/Systems Completes Acquisition of DataThread
  • Using a Custom Journal for Network Security Audit Entries
  • Register for the IBM i Security Event of the Year
  • Q&A: What are the system requirements for Compliance Monitor 3.01?

June 2011 View full newsletter

  • Inherited Authority Can Sabotage Your System
  • Register Now for the 2011 IBM i Security Event of the Year
  • Q&A: Can Compliance Monitor show me when users sign on to the system?

May 2011 View full newsletter

  • PowerTech Releases 2011 "State of IBM i Security" Study
  • Trivia: What three values does the "Limit capabilities" parameter support for user profiles?
  • Q&A: Can Compliance Monitor show me when someone creates new user profiles?

April 2011 View full newsletter

  • PCI Compliance for IBM i—Part 2
  • Security Officer or Security Nightmare?
  • Q&A: What you need to know about mirroring Network Security 6

March 2011 View full newsletter

  • PCI Compliance for IBM i
  • IBM i Open Source Security Policy Now Available
  • Q&A: What you need to know about backing up Network Security 6

February 2011 View full newsletter

  • IBM i Security Conference
  • Database Monitoring with DataThread
  • Q&A: Running security-related reports on IBM i

January 2011 View full newsletter

  • 2010 in Review
  • 7 Habits of Highly Secure Companies: Part III
  • Q&A: Removing old product libraries after upgrading to Network Security 6

November 2010 View full newsletter

  • Controlling SQL Updates Using Network Security
  • 7 Habits of Highly Secure Companies: Part II
  • Q&A: Using PowerTech Network Security to globally prevent users from updating data via ODBC

October 2010 View full newsletter

  • 7 Deadly Habits of Unsecure Companies
  • Harvest Time for Audit Journal Data
  • Q&A: Automating reports for auditor reviews with Authority Broker
  • It Pays to Comply: Financial data breaches linked to poor security compliance

September 2010 View full newsletter

  • Keep An Audit Eye On Your System Values!
  • Viruses On Your IBM i Server?
  • Q&A: The "PowerTech Products Menu"
  • Security Vulnerabilities: Unpatched Flaws on the Rise

August 2010 View full newsletter

  • Back to (Security) School
  • Real-Time Event Escalation: Be Part of the Big Picture!
  • Q&A: Compliance Monitor with Paul Culin

July 2010 View full newsletter

  • What's involved in a PowerTech Compliance Assessment?
  • Limiting an *ALLOBJ user to read-only data access
  • Q&A: What’s the difference between Compliance Monitor’s Console and Consolidator filters?
  • The end of Sarbanes-Oxley?

June 2010 View full newsletter

  • Network Security 6.0 Secures Access to Critical Data
  • Behind the New Network Security Release
  • Q&A: I would love to get real-time event notifications from my System i with Interact. How difficult is it to set up?
  • Verisign to sell authentication unit

May 2010 View full newsletter

  • Advisory Board Meets in Minneapolis
  • IBM Enhances OS Security Functions
  • Q&A: So far, I have run Network Security only in "audit mode." Now, I want to start locking down my servers.
    I’m a little scared about locking out the wrong people. Do you have any advice?
  • State of IBM i Security Study: 2010 Edition Available

April 2010 View full newsletter

  • 2010 Edition of the State of IBM i Security study now available!
  • Don't miss these security sessions at COMMON!
  • Q&A: Several of my users have JOBCTL and SAVSYS Special Authorities. Should I be concerned?
  • Coming soon: Network Security 6.0!
  • U.S. Secret Service paid TJX hacker $75K a year in cash
  • MD5 hash vulnerability is expert's top Web security flaw
  • Does New Breach Law Have Teeth?

March 2010 View full newsletter

  • Creating A Security Policy For Your Organization
  • COMMON Turns 50!
  • What goes into publishing the annual "State of IBM i Security" study?
  • Q&A: How do you set up a "user rule" in Network Security to allow a transaction or event?
  • New Security Guide Released
  • MA data privacy law takes effect
  • Is the U.S. losing the cyber war?

February 2010 View full newsletter

  • Hit The Road, Robin!
  • Online Training
  • Midrange User Groups
  • IBM i Security Workshops
  • Slash Your Complance Workload!
  • Q&A: Is there a way to track interactive signon events for QSECOFR (or other user profiles)?
  • Q&A: Can Authority Broker notify my system administrator at the start of every role swap?
  • Sweepstakes Winner Announced
  • Feds and Cybersecurity
  • IE 6 under attack...again

January 2010 View full newsletter

  • New Year's Resolutions for 2010
  • PowerTech: Beyond Software
  • Q&A: We are planning a disaster recovery test. What do I need to do for Authority Broker?
  • Q&A: I have several users who require the same access to the same servers within Network Security, however they don’t belong to a common group profile. Is there an easy way to configure the settings for multiple users?
  • NASA's Hack Woes Continue
  • Active PDF attacks target Acrobat Reader

December 2009 View full newsletter

  • Accountability for powerful users
  • Controlling SQL updates using Network Security
  • Q&A: The ‘All System Values’ Report in Compliance Monitor shows my system value settings and highlights values that are non-compliant. Is there a way to adjust the Security Policy for a test or development system?
  • 44% of Agencies Had More Security Incidents in Past Year
  • 8 Hackers Indicted in $9 Million ATM Theft

November 2009 View full newsletter

  • Are you playing a game of chance with unauthorized access to your company's private data?
  • Stay in touch with PowerTech on Twitter!
  • Q&A: How can I set up Authority Broker to run event reports automatically?
  • Q&A: Where does Network Security record its audit entries?
  • More bank phishing attacks
  • Congress may consider National Data Breach Law

October 2009 View full newsletter

  • Meet Our New Director of Security Technologies
  • IBM Eye: Security Detective for Hire
  • Help/Systems and PowerTech Celebrate One-Year Anniversary!
  • Q&A: In Network Security, is there a way to notify our Security Officer when an unauthorized user attempts to access sensitive data using FTP or ODBC?
  • Q&A: I really like the Compliance Monitor Scorecards, but I was wondering whether I can use my company’s logo in the upper left hand corner of the report?