z/VM V6R4 was announced on October 25, 2016 with a planned availability date of November 11, 2016.
A summary of the toleration fixes that have been made available for zSecure can be found on the Service Management Connect - System z blog.
They apply to zSecure Manager for RACF z/VM 1.11.1 and 1.11.2, and to zSecure for z/OS 2.1.0, 2.1.1, and 2.2.0.
In an exci
Be sure to check out presentations from Dave Stewart and Eitan Worcel on Tuesday, November 15th at 11:00am ET.
In this live webinar, you will learn how you can:
For more information, visit:
In his new article, Yang Qi demonstrates how you can apply the Node.js application ot the new enhancements of the Auto-Scaling for Bluemix® service.
So what does this mean for security enthusiasts? It means that you can actually improve the elasticity of your applications with the features on the Auto-Scaling service. It means that you can customize your policy and automatically increase or decrease the CPU threshold, thus maintaining a healthy condition without wasting resources.
This tutorial also shows you just how easy it is to utilize the new metric types, heap and throughput.
Check out the article today!
The TRS Q3 cash payment recipients have just been announced. A huge congratulations to these Security contributors who have been recognized:
by Nandkishor V Gitte and Joseph Fitterer
(NOTE: The PDF file has been updated with clickable hyperlinks.)
This workbook contains a series of lab exercises to introduce you to JK Enterprises, which uses the features of IBM Security Identity Manager virtual appliance 220.127.116.11.
The objective of the lab exercises is to provide you with hands-on experience with the configuration and operation of IBM Security Identity Manager 18.104.22.168.
The workbook is designed to complement the presentations that cover each of the features. More detailed information on IBM Security Identity Manager 22.214.171.124 features and functions are found in these presentations. More information is also available in the product documentation on IBM Knowledge Center.
To find more cookbooks, visit IdentityDev at:
We've all been hearing more and more about BigFix®. If you're an IBM BigFix administrator, you'll want to read on. (Even if you're not, you'll find this interesting!). Here, we have an article from Marco Mattia where he outlines Virtual Relays and the instructions on how to use the this feature. You'll learn the benefits and advantages as well to using a BigFix Virtual Relay.
Check out the PDF links below. Happy reading!
Ever experienced a situation like this image of numerous tests and heavy server load? Minimize time wasted on "noise."
Common false positives waste developers' time and energy--with this new tutorial by by Akash Shetty and others, you can root out those common problems.
IBM Security AppScan® is an automated web application security assessment tool that identifies prominent security vulnerabilities, including OWASP Top Ten and SANS 25 vulnerabilities. The tool also provides detailed reports on security issues along with advisory and fix recommendations. With the help of this tutorial, AppScan users can significantly reduce the number of false positives reported.
We have a new tutorial up on the Security hub: "Ass
In this tutorial, author Madhusudhan Rajappa shows you an effective way of conducting a vulnerability assessment of the web applications and network of any organization. This tutorial also shows how to proactively defend the organization from cyber attacks by using a combination of enterprise-grade and trustworthy vulnerability scanners. The scanners that will be discussed in this tutorial are the Tenable™ Nessus® Scanner and the IBM AppScan® Enterprise. Read
Have you visited the Tech
"I’d like to share some information about a TRS dW Content challenge option that we don’t see many of you taking: developerWorks Recipes.
Creating a dW Recipe is one of the fastest and easiest choices in the TRS program to both contribute technical content AND possibly earn a cash payment.
dW Recipes help developers solve specific problems using IBM products and services. Your Recipe should help developers create something useful, walking them through each part of the process."
Try it today, in three simple steps!
Need inspiration before you begin? Check out this selection of popular Recipes:
In this blog post, Mark Leitch demonstrates the BigFix® Query capability and the topology "power" of the infrastructure.
IBM BigFix is a powerful security product able to manage hundreds of thousands of endpoints. BigFix has recently delivered the BigFix Query capability, offering more insight and control over your business. We will give an introduction to BigFix Query, and then demonstrate how it leverages the time tested and field proven BigFix infrastructure to provide impressive results at scale! To read more about this topic, read the blog post in full here:
Subject matter experts will be available to answer your questions, which you can ask through web chat during the presentation. You can also submit them in advance at this URL.
You might also be interested in this
This integration also applies to the zSecure Adapters for QRadar SIEM. The complementary integration with zSecure Alert will be briefly mentioned.
This SSE for zSecure 2.2 provides the following benefits:
- filter commands to quickly zoom in to records of interest
- fast navigation to jump to RACF user and group details
- quick admin capability for TSO and UNIX properties
- enhanced e-mail configuration
- ability to configure large buffers 'above the bar' (64-bit exploitation)
These changes apply to one or more of the following components: zSecure Admin, zSecure Audit, and zSecure Alert.
Details can be found in this blog entry by Jeroen Tiggelman on the Service Management Connect - System z blog.
In this lab configuration guide, authors Smita Kale, Bosko (Boli) Popovic and Vladimir Jeremic walk you through how to set up the lab environment when demonstrating an integration use case.
The IBM Security products that are used to manage user activity on the network video focuses on using IBM XGS, Identity Manager, and Directory Integrator to control user access. The video is available at: http
The Lab Configuration Guide describes the configuration settings necessary for each of the IBM products used in the scenario that is demonstrated in the video. The video assumes that the initial setup was performed for the XGS, Identity Manager, and Directory Integrator products. This guide describes the configuration sets needed to enable the product integration for delivering the end user experience described in the video.
The configuration files needed for Identity Manager are also included, as well as the custom XGS adapter in a .jar package. All assembly lines are included.
To view the full Lab Configuration Guide, click here:
Check out this article from authors Jia Li Chen, Wei Wei Zhang, and Cheng-Yu Yu on how to retrieve deleted templates in AppScan.
In AppScan Enterprise, there are 14 default scan templates installed within the product. However, users may delete default templates in the console by mistake. Learn two methods to retrieve default templates in AppScan Enterprise.
An expert panel will host a Q&A session on all things Cognitive Security and Watson for Cyber Security.
The hangout starts today at 1:30-2:30 pm ET.