It provides security intelligence and analytics improvements:
* a near real-time SMF event feed to IBM Security QRadar SIEM
* a zSecure Admin Access Monitor feed to zSecure Alert
* performance and scalability improvements
It extends support for these security standards:
* Security Technical Implementation Guide (STIG) 6.29
* Payment Card Industry Data Security Standard (PCI-DSS) 3.2
It provides currency support for:
* CA-ACF2 16 and CA-Top Secret 16
* MQ 9
* Service stream security enhancements for z/OS and RACF
Details can be found on Service Management Connect - System z in this blog entry by Jeroen Tiggelman.
In this tech note, the authors' purpose is to provide best practices on the topic of enabling DB2 native encryption in an HADR environment. Additionally, the note provides a simplified set of working steps, with examples. These steps are designed to minimize the downtime at the database service.
z/VM V6R4 was announced on October 25, 2016 with a planned availability date of November 11, 2016.
A summary of the toleration fixes that have been made available for zSecure can be found on the Service Management Connect - System z blog.
They apply to zSecure Manager for RACF z/VM 1.11.1 and 1.11.2, and to zSecure for z/OS 2.1.0, 2.1.1, and 2.2.0.
In an exci
Be sure to check out presentations from Dave Stewart and Eitan Worcel on Tuesday, November 15th at 11:00am ET.
In this live webinar, you will learn how you can:
For more information, visit:
In his new article, Yang Qi demonstrates how you can apply the Node.js application ot the new enhancements of the Auto-Scaling for Bluemix® service.
So what does this mean for security enthusiasts? It means that you can actually improve the elasticity of your applications with the features on the Auto-Scaling service. It means that you can customize your policy and automatically increase or decrease the CPU threshold, thus maintaining a healthy condition without wasting resources.
This tutorial also shows you just how easy it is to utilize the new metric types, heap and throughput.
Check out the article today!
The TRS Q3 cash payment recipients have just been announced. A huge congratulations to these Security contributors who have been recognized:
by Nandkishor V Gitte and Joseph Fitterer
This workbook contains a series of lab exercises to introduce you to JK Enterprises, which uses the features of IBM Security Identity Manager virtual appliance 126.96.36.199.
The objective of the lab exercises is to provide you with hands-on experience with the configuration and operation of IBM Security Identity Manager 188.8.131.52.
The workbook is designed to complement the presentations that cover each of the features. More detailed information on IBM Security Identity Manager 184.108.40.206 features and functions are found in these presentations. More information is also available in the product documentation on IBM Knowledge Center.
We've all been hearing more and more about BigFix®. If you're an IBM BigFix administrator, you'll want to read on. (Even if you're not, you'll find this interesting!). Here, we have an article from Marco Mattia where he outlines Virtual Relays and the instructions on how to use the this feature. You'll learn the benefits and advantages as well to using a BigFix Virtual Relay.
Check out the PDF links below. Happy reading!
Ever experienced a situation like this image of numerous tests and heavy server load? Minimize time wasted on "noise."
Common false positives waste developers' time and energy--with this new tutorial by by Akash Shetty and others, you can root out those common problems.
IBM Security AppScan® is an automated web application security assessment tool that identifies prominent security vulnerabilities, including OWASP Top Ten and SANS 25 vulnerabilities. The tool also provides detailed reports on security issues along with advisory and fix recommendations. With the help of this tutorial, AppScan users can significantly reduce the number of false positives reported.
We have a new tutorial up on the Security hub: "Ass
In this tutorial, author Madhusudhan Rajappa shows you an effective way of conducting a vulnerability assessment of the web applications and network of any organization. This tutorial also shows how to proactively defend the organization from cyber attacks by using a combination of enterprise-grade and trustworthy vulnerability scanners. The scanners that will be discussed in this tutorial are the Tenable™ Nessus® Scanner and the IBM AppScan® Enterprise. Read