|
> |
E-business: security for your e-business Enterprise Systems Journal |
|
Business and security are inseparable, but oftentimes the business and technical management in a company is at odds with how to have an e-business and how to take reasonable security measures. Taking the corporate manager's point of view, this article presents a useful process for analyzing your risks, determining reasonable measures to mitigate those risks, and developing a process to maintain the security of your enterprise. (Aug. 2000) |
|
URL: http://www.esj.com/fullarticle.asp?ID=7260030719PM |
|
|
> |
IBM speeds SSL traffic Internet Week |
|
A perennial frustration for e-commerce managers is the plodding pace of Secure Sockets Layer transactions, which link a user safely to a Web site that is selling a product or transacting confidential business. IBM has gotten a leg up on the problem with its S/390 G5 and G6 Enterprise Servers. (May 1, 2000) |
|
URL: http://www.techweb.com/se/directlink.cgi?INW2000050... |
|
|
> |
What Does the Future Hold for CA-ACF2 & CA-Top Secret? Farber/LaChance Online |
|
Kirk Willis, Senior VP of R&D and OS/390 Security Technology Owner at Computer Associates, answers questions about the current and future status of CA's security products, CA-ACF2 and CA-Top Secret. (April 2000) |
|
URL: http://www.farberlachance.com/articles/articles.cfm... |
|
|
> |
What does the future hold for RACF? Farber/LaChance Online |
|
Linda Distel, Program Director, IBM S/390, answers 20 questions about the current status and future directions of long-time IBM security product RACF. (April 2000) |
|
URL: http://www.farberlachance.com/articles/articles.cfm... |
|
|
> |
Web-to-host connections: network security: Damn the hackers, full speed ahead Enterprise Systems Journal |
|
In Web-to-host deployments, firewalls, VPNs, SSL and PKIs provide a high degree of security that are coupled with an S/390 or AS/400ís inherent security features built in below the machine interface layer. However, while systems may have multiple layers of security from Web attacks, there is still an Achillesí Heel--passwords. (May 2000) |
|
URL: http://www.esj.com/blastarticle.asp?ID=520042535PM |
|
|
> |
Security automation at Hewitt Associates LLC Farber/LaChance Online |
|
Security procedures that are administrated manually can prove tedious, inefficient and costly, especially in large-scale environments. Without automation, the door can be left open for security breaches, providing the opportunities for unauthorized access to crucial corporate data. Users must complete free registration to access this article. |
|
URL: http://www.farberlachance.com/prefs/articles.cfm?ar... |
|
|
> |
RACF-L Archives |
|
Searchable archives of the RACF list server discussion group sponsored by the University of Georgia. You can also subscribe and post to the list from this page. |
|
URL: http://www.listserv.uga.edu/archives/racf-l.html |
|
|
> |
Frequently asked questions about RACF IBM |
|
Answers to the questions IBM is most frequently asked about RACF. They have been culled from user group meetings, the RACF-L mailing list, and customer briefings. |
|
URL: http://www.s390.ibm.com/products/racf/faqs.html |
|
|
> |
RACF User News |
|
A quarterly newsletter produced by the Henderson Group for users of RACF, IBM's mainframe computer security software. Here you can read current and archived issues or subscribe for your own copy. |
|
URL: http://home.us.net/~stu/index.html |
|
|