Daniel Magid

The IBM i Security Maturity Model: Protecting Your Mission-Critical Systems

In today’s interconnected computing landscape, IBM i security has become a critical concern as these systems often find themselves in a precarious position. They typically house an organization’s most vital data while sometimes operating as “security islands” within the enterprise architecture. As I speak with CIOs and IT leaders, I frequently hear confidence about enterprise-wide […]

The IBM i Security Maturity Model: Protecting Your Mission-Critical Systems Read More »

IBMi DevOps security blog post header.

Secure by Design: How DevOps Security Transforms IBM i Development

Do you know with certainty what code you actually have running in production? Does the source location match the location identified in the object description? Are you really aware of what changes are being made to the code and whether that code is protected from potential security vulnerabilities? Implementing proper IBM i DevOps security practices

Secure by Design: How DevOps Security Transforms IBM i Development Read More »

Secure API Authentication for IBM i: Protecting Your System While Enabling Integration

Our previous security blogs explored how IBM i systems are often isolated from enterprise security architectures and discussed implementing technologies like Okta for Multi-Factor Authentication. Our last blog focused on the vulnerabilities inherent in using Basic Authentication and the reasons to replace Basic Authentication with more modern authentication methods. Today, I want to focus on

Secure API Authentication for IBM i: Protecting Your System While Enabling Integration Read More »

Unifying Your IBM i Security: Integrating Okta for MFA & SSO

In our previous security blogs, we’ve discussed how IBM i systems are often treated as “security islands” within enterprise architectures. Today, I want to tackle a practical solution to this problem: integrating your IBM i with Okta for Multi-Factor Authentication (MFA) and Single Sign-On (SSO).  Why IBM i Security Integration Matters  Almost weekly, I meet

Unifying Your IBM i Security: Integrating Okta for MFA & SSO Read More »

IBM i API security implementation.

IBM i API Security: Best Practices for Protecting System Credentials

IBM i API security has become a critical concern as organizations expand their integration strategies. Many IBM i teams unknowingly compromise their system security through outdated IBM i access authentication practices. The most concerning vulnerability? Using and storing IBM i credentials for IBM i access from other systems is a practice that creates multiple security

IBM i API Security: Best Practices for Protecting System Credentials Read More »

IBM i MFA security implementation.

IBM i MFA Security: Breaking Down Enterprise Integration Barriers

Enterprise IBM i MFA security remains a critical challenge for many organizations. Last week, I met with the CIO of a large manufacturing company who was confident their enterprise was fully protected by multi-factor authentication. “We’ve implemented MFA across our entire infrastructure,” he assured me. Then came the pause. “Well, except for the IBM i

IBM i MFA Security: Breaking Down Enterprise Integration Barriers Read More »

Modernizing IBM i Development: A Guide to DevOps Transformation

IBM i DevOps modernization is becoming increasingly critical for organizations, yet one question keeps surfacing in my conversations with IT leaders: “Why should we change our IBM i change management system when what we have works?” It’s a fair question. After all, your current system has served you well for years, managing code changes reliably,

Modernizing IBM i Development: A Guide to DevOps Transformation Read More »

DevOps for IBM i: The Ultimate Guide to Modernizing Developer Skills

Recently, I sat down with a team of veteran IBM i developers who had just completed their first month of using modern DevOps tools. “It’s like learning a new language,” one developer told me, mixing frustration with pride. “Challenging, but once things click, you wonder how you ever worked differently.”  This conversation echoes what I’ve

DevOps for IBM i: The Ultimate Guide to Modernizing Developer Skills Read More »

How to Automate IBM i Development: A Modern DevOps Guide for Traditional Systems

Get Full Lifecycle DevOps Automation using Open-Source DevOps Tools In my many recent conversations with IBM i users regarding modernization, one recurring theme has stood out: a strong desire to harness the power of Git for IBM i source code version control. However, many of these users have used IBM i native change management tools

How to Automate IBM i Development: A Modern DevOps Guide for Traditional Systems Read More »