Identify Escalated Privilege Attacks on IBM i

Manage episode 181823268 series 8408
By Discovered by Player FM and our community — copyright is owned by the publisher, not Player FM, and audio streamed directly from their servers.
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server.
Download this podcast to learn about:
Identifying escalated privilege attacks on the IBM i
Determining the true level of authority of a user profile
Controlling and monitoring administrative level users
Setting email alerts to include critical job and security information

79 episodes available. A new episode about every 37 days averaging 17 mins duration .