Daniel Magid

Digital data streams and particles representing comprehensive security monitoring and enterprise-wide visibility for IBM i systems

The IBM i Security Maturity Model: Protecting Your Mission-Critical Systems

In today’s interconnected computing landscape, IBM i security has become a critical concern as these systems often find themselves in a precarious position. They typically house an organization’s most vital data while sometimes operating as “security islands” within the enterprise architecture. As I speak with CIOs and IT leaders, I frequently hear confidence about enterprise-wide

The IBM i Security Maturity Model: Protecting Your Mission-Critical Systems Read More »

Colorful flowing wave pattern representing secure DevOps transformation and continuous integration workflows for IBM i development

Secure by Design: How DevOps Security Transforms IBM i Development

Do you know with certainty what code you actually have running in production? Does the source location match the location identified in the object description? Are you really aware of what changes are being made to the code and whether that code is protected from potential security vulnerabilities? Implementing proper IBM i DevOps security practices

Secure by Design: How DevOps Security Transforms IBM i Development Read More »

Blue network mesh with connected nodes representing secure API authentication, token-based security, and protected IBM i system integration

Ultimate IBM i API Security Guide: Protect Your System Now

Our previous security blogs explored how IBM i systems are often isolated from enterprise security architectures and discussed implementing technologies like Okta for Multi-Factor Authentication. Our last blog focused on the vulnerabilities inherent in using Basic Authentication and the reasons to replace Basic Authentication with more modern authentication methods. Today, I want to focus on

Ultimate IBM i API Security Guide: Protect Your System Now Read More »

Digital network visualization showing IBM i Okta integration architecture with connected security nodes for enterprise MFA implementation

Unifying Your IBM i Security: Integrating Okta for MFA & SSO

In our previous security blogs, we’ve discussed how IBM i systems are often treated as “security islands” within enterprise architectures. Today, I want to tackle a practical solution to this problem: integrating your IBM i with Okta for Multi-Factor Authentication (MFA) and Single Sign-On (SSO). Why IBM i Security Integration Matters Almost weekly, I meet

Unifying Your IBM i Security: Integrating Okta for MFA & SSO Read More »

Digital security shield with lock icon representing IBM i API protection through modern token-based authentication and credential safeguarding

IBM i API Security: Best Practices for Protecting System Credentials

IBM i API security has become a critical concern as organizations expand their integration strategies. Many IBM i teams unknowingly compromise their system security through outdated IBM i access authentication practices. The most concerning vulnerability? Using and storing IBM i credentials for IBM i access from other systems is a practice that creates multiple security

IBM i API Security: Best Practices for Protecting System Credentials Read More »

Global enterprise security visualization showing laptop with lock icon on world map representing IBM i MFA integration across international business networks

IBM i MFA Security: Breaking Down Enterprise Integration Barriers

Enterprise IBM i MFA security remains a critical challenge for many organizations. Last week, I met with the CIO of a large manufacturing company who was confident their enterprise was fully protected by multi-factor authentication. “We’ve implemented MFA across our entire infrastructure,” he assured me. Then came the pause. “Well, except for the IBM i

IBM i MFA Security: Breaking Down Enterprise Integration Barriers Read More »

Digital transformation visualization showing IBM i DevOps modernization with flowing data and technology streams

DevOps for IBM i: The Ultimate Guide to Modernizing Developer Skills

Recently, I sat down with a team of veteran IBM i developers who had just completed their first month of using modern DevOps tools. “It’s like learning a new language,” one developer told me, mixing frustration with pride. “Challenging, but once things click, you wonder how you ever worked differently.” This conversation echoes what I’ve

DevOps for IBM i: The Ultimate Guide to Modernizing Developer Skills Read More »