Carol Woodbury

 

  Sort By:
  Display:
Published Title Category Hits
20 February 2015 Group Profiles in Review IBM i (OS/400, i5/OS) | Security 3,847
23 January 2015 Start Thinking About Security in New Ways Compliance / Privacy | Security 3,605
19 December 2014 Carol's Favorite (IBM i and Other) Things IBM i (OS/400, i5/OS) | Security 4,221
21 November 2014 Protecting Your Passwords on IBM i IBM i (OS/400, i5/OS) | Security 4,592
17 October 2014 Who's More Dangerous? The Person You Know or the Person You Don't Know? Security - Other | Security 3,328
19 September 2014 Adopted Authority: Friend or Foe? IBM i (OS/400, i5/OS) | Security 5,144
15 August 2014 Security Patrol: The Hidden Dangers of Shadow IT Security - Other | Security 4,144
18 July 2014 Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls IBM i (OS/400, i5/OS) | Security 7,192
14 July 2014 Before Moving to the Cloud, Get Your Rain Gear On Security - Other | Security 3,538
20 June 2014 Security Patrol: V7R2 Security Enhancements, Part 1 IBM i (OS/400, i5/OS) | Security 6,898
16 May 2014 Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? IBM i (OS/400, i5/OS) | Security 10,143
18 April 2014 Security Patrol: Detecting a Breach IBM i (OS/400, i5/OS) | Security 4,056
21 March 2014 Security Patrol: Pretend You've Been Hacked Security - Other | Security 3,289
24 February 2014 Virus Got You Down? IBM i (OS/400, i5/OS) | Security 3,792
10 February 2014 PCI and What It Means to IBM i IBM i (OS/400, i5/OS) | Security 3,433
10 June 2013 Top Ten Security Considerations for the Cloud Compliance / Privacy | Security 3,934
13 May 2013 Top Ten New Features of IBM i Security IBM i (OS/400, i5/OS) | Security 4,073
11 March 2013 5 Ways to Control Access using Application Administration IBM i (OS/400, i5/OS) | Security 3,879
26 November 2012 5 Steps for Implementing Role-Based Access on the IBM i IBM i (OS/400, i5/OS) | Security 3,547
13 June 2012 Securing Your Printed Output IBM i (OS/400, i5/OS) | Security 4,661
11 June 2012 Protecting Your Data: How Much Security Is Enough? Compliance / Privacy | Security 3,438
23 May 2012 Common Questions You Have About AIX Security but Were Afraid to Ask UNIX / AIX | Operating Systems | IT Infrastructure 12,817
23 April 2012 Security Considerations for the Cloud Compliance / Privacy | Security 3,384
08 August 2011 Security and the Cloud: Blue Skies or a Major Storm? Compliance / Privacy | Security 4,286
13 June 2011 What Authorities Do Programmers Really Need? IBM i (OS/400, i5/OS) | Security 5,063
09 May 2011 You Don't Trust Me Anymore! Compliance / Privacy | Security 37,688
28 February 2011 Ways to Use the IBM i Audit Journal IBM i (OS/400, i5/OS) | Security 8,162
25 October 2010 What's Hot and What's Not in the World of Security Technology Security - Other | Security 5,589
11 October 2010 Getting a Jump Start on Your Impending Audit! IBM i (OS/400, i5/OS) | Security 4,407
08 September 2010 Does Privacy Assure Compliance? Compliance / Privacy | Security 5,670
09 August 2010 Security Considerations for the Cloud Security - Other | Security 4,792
24 May 2010 Does Compliance Guarantee Privacy? Compliance / Privacy | Security 5,409
14 April 2010 Sneak Peek of the New Security Features in V7 IBM i (OS/400, i5/OS) | Security 6,696
25 January 2010 Do You Understand the Foundations Behind Today's Compliance Laws and Regulations? Compliance / Privacy | Security 5,965
26 October 2009 Partner TechTip: Setting Authority Is Not a One-Time Event Security - Other | Security 5,653
26 August 2009 Partner TechTip: Do "Sensitive" Commands Need Extra Security? Security - Other | Security 5,972
22 June 2009 Partner TechTip: Why Should You Care What Happens in Massachusetts? Security - Other | Security 5,117
05 April 2009 SkyView Risk Assessor Now Includes PCI-Specific Considerations Compliance / Privacy | Security News | News 5,102
22 March 2009 Compliance Without the Complexities Security - Other | Security 6,336
11 February 2009 Employing Best Practices for IBM i Security IBM i (OS/400, i5/OS) | Security 7,681
11 February 2009 Partner TechTip: Let's Review! Security - Other | Security 5,607
19 December 2008 Partner TechTip: Five Tips for Protecting Your Organization Security - Other | Security 5,044
14 November 2008 Partner TechTip: Don't Forget These User Profile Attributes Security - Other | Security 6,356
17 October 2008 Partner TechTip: How Do You Ensure Data Integrity? Security - Other | Security 6,061
19 September 2008 Partner TechTip: Answers to Your Burning i5/OS Auditing Questions Security - Other | Security 6,013
20 June 2008 Partner TechTip: Utilizing the QUSEADPAUT System Value Security - Other | Security 6,598
28 March 2008 Partner TechTip: Changing QCRTAUT in i5/OS Security - Other | Security 5,019
24 March 2008 Will Moving to V6R1 Make Your System More Secure? IBM i (OS/400, i5/OS) | Security 8,173
13 February 2008 Understand How to Address Current Compliance Regulations Compliance / Privacy | Security 6,666
30 November 2007 Partner TechTip: Hidden Treasures Security - Other | Security 5,109
Carol Woodbury

Carol Woodbury is President and CTO of DXR Security and has over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies – SkyView Partners and DXR Security. Her current company - DXR Security - specializes in penetration testing for IBM i. Her practical experience together with her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known world-wide as an author and award-winning speaker on security technology, specializing in IBM i Security topics. She has written seven books on IBM i Security. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance: Second Edition IBM i Security Administration and Compliance: Second Edition
Get the must-have guide by the industry’s #1 security authority.
List Price $71.95

Now On Sale

IBM i Security Administration and Compliance IBM i Security Administration and Compliance
For beginners to veterans, this is the definitive security resource.
List Price $69.95

Now On Sale