On the System z Management blog, Jeroen Tiggleman has published a summ
zSecure is an excellent platform to help you secure your System z platform and can be used to detect both external and insider threats to your system. To find out more about how you can help detect insider threats in your IT environment, you can download and read "Sta
Mihal Iacob and Walid Rhaibi have just published "Res
From the article summary:
System administrators are responsible for, among other things, protecting a database against unauthorized access or misuse by authorized database users (for example, inappropriate access to sensitive information within a database). A common requirement to mitigate such risks is ensuring that users are allowed to connect to the database only from a list of trusted hosts or IP addresses that are known to be secure. This article gives a practical example of how such a requirement can be put in practice by making use of the CONNECT_PROC database configuration parameter of IBM® DB2® for Linux®, UNIX®, and Windows®.