Artwork
iconShare
 
Manage episode 181823273 series 51092
Content provided by Luke Probasco and Townsend Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Luke Probasco and Townsend Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server.
Download this podcast to learn about:
Identifying escalated privilege attacks on the IBM i
Determining the true level of authority of a user profile
Controlling and monitoring administrative level users
Setting email alerts to include critical job and security information
  continue reading

85 episodes