29
Fri, Nov
0 New Articles

Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
24 July 2015 FTP on IBM i: Does It Honor the User Profile's Limited Capability Setting or Not? IBM i (OS/400, i5/OS) | Security 7,798
19 June 2015 The Benefits of a Strong Security Implementation…Beyond Security IBM i (OS/400, i5/OS) | Security 3,890
15 May 2015 Tips for Preparing for an IBM i Audit IBM i (OS/400, i5/OS) | Security 4,420
17 April 2015 True or False: A Pop Quiz on IBM i Security Facts IBM i (OS/400, i5/OS) | Security 5,213
20 March 2015 IFS for IBM i in Review IBM i (OS/400, i5/OS) | Security 5,905
20 February 2015 Group Profiles in Review IBM i (OS/400, i5/OS) | Security 4,724
23 January 2015 Start Thinking About Security in New Ways Compliance / Privacy | Security 4,593
19 December 2014 Carol's Favorite (IBM i and Other) Things IBM i (OS/400, i5/OS) | Security 5,112
21 November 2014 Protecting Your Passwords on IBM i IBM i (OS/400, i5/OS) | Security 5,443
17 October 2014 Who's More Dangerous? The Person You Know or the Person You Don't Know? Security - Other | Security 4,208
19 September 2014 Adopted Authority: Friend or Foe? IBM i (OS/400, i5/OS) | Security 6,262
15 August 2014 Security Patrol: The Hidden Dangers of Shadow IT Security - Other | Security 5,020
18 July 2014 Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls IBM i (OS/400, i5/OS) | Security 8,148
14 July 2014 Before Moving to the Cloud, Get Your Rain Gear On Security - Other | Security 4,515
20 June 2014 Security Patrol: V7R2 Security Enhancements, Part 1 IBM i (OS/400, i5/OS) | Security 7,759
16 May 2014 Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? IBM i (OS/400, i5/OS) | Security 12,181
18 April 2014 Security Patrol: Detecting a Breach IBM i (OS/400, i5/OS) | Security 5,006
21 March 2014 Security Patrol: Pretend You've Been Hacked Security - Other | Security 4,271
24 February 2014 Virus Got You Down? IBM i (OS/400, i5/OS) | Security 4,749
10 February 2014 PCI and What It Means to IBM i IBM i (OS/400, i5/OS) | Security 4,263
10 June 2013 Top Ten Security Considerations for the Cloud Compliance / Privacy | Security 4,933
13 May 2013 Top Ten New Features of IBM i Security IBM i (OS/400, i5/OS) | Security 5,028
11 March 2013 5 Ways to Control Access using Application Administration IBM i (OS/400, i5/OS) | Security 4,810
26 November 2012 5 Steps for Implementing Role-Based Access on the IBM i IBM i (OS/400, i5/OS) | Security 4,634
13 June 2012 Securing Your Printed Output IBM i (OS/400, i5/OS) | Security 5,771
11 June 2012 Protecting Your Data: How Much Security Is Enough? Compliance / Privacy | Security 4,367
23 May 2012 Common Questions You Have About AIX Security but Were Afraid to Ask UNIX / AIX | Operating Systems | IT Infrastructure 13,894
23 April 2012 Security Considerations for the Cloud Compliance / Privacy | Security 4,460
08 August 2011 Security and the Cloud: Blue Skies or a Major Storm? Compliance / Privacy | Security 5,019
13 June 2011 What Authorities Do Programmers Really Need? IBM i (OS/400, i5/OS) | Security 5,955
09 May 2011 You Don't Trust Me Anymore! Compliance / Privacy | Security 38,416
28 February 2011 Ways to Use the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 9,237
25 October 2010 What's Hot and What's Not in the World of Security Technology Security - Other | Security 6,175
11 October 2010 Getting a Jump Start on Your Impending Audit! IBM i (OS/400, i5/OS) | Security 5,213
08 September 2010 Does Privacy Assure Compliance? Compliance / Privacy | Security 6,430
09 August 2010 Security Considerations for the Cloud Security - Other | Security 5,454
24 May 2010 Does Compliance Guarantee Privacy? Compliance / Privacy | Security 6,132
14 April 2010 Sneak Peek of the New Security Features in V7 IBM i (OS/400, i5/OS) | Security 7,539
25 January 2010 Do You Understand the Foundations Behind Today's Compliance Laws and Regulations? Compliance / Privacy | Security 6,952
26 October 2009 Partner TechTip: Setting Authority Is Not a One-Time Event Security - Other | Security 6,301
26 August 2009 Partner TechTip: Do "Sensitive" Commands Need Extra Security? Security - Other | Security 6,647
22 June 2009 Partner TechTip: Why Should You Care What Happens in Massachusetts? Security - Other | Security 5,832
05 April 2009 SkyView Risk Assessor Now Includes PCI-Specific Considerations Compliance / Privacy | Security News | News 5,832
22 March 2009 Compliance Without the Complexities Security - Other | Security 6,986
11 February 2009 Employing Best Practices for IBM i Security IBM i (OS/400, i5/OS) | Security 8,640
11 February 2009 Partner TechTip: Let's Review! Security - Other | Security 6,317
19 December 2008 Partner TechTip: Five Tips for Protecting Your Organization Security - Other | Security 5,781
14 November 2008 Partner TechTip: Don't Forget These User Profile Attributes Security - Other | Security 7,075
17 October 2008 Partner TechTip: How Do You Ensure Data Integrity? Security - Other | Security 6,704
19 September 2008 Partner TechTip: Answers to Your Burning i5/OS Auditing Questions Security - Other | Security 6,655
Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale