Scarlet Witch and IBM i. You may not possess chaos magic yourself

You may not possess chaos magic yourself But you can use it to help with your GDPR & HIPA compliance. The Scarlet Witch was kidnapped and used as a subject of genetic experimentation by the High Evolutionary. This left her a powerful sorceress with abilities to alter the world in many ways. Luckily, you can […]

IBM i Data Security: Are you Playing your Cards Right?

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back Perhaps following on from my previous blog, you’ve got an extract of your live data, an intelligent subset that drives the key test conditions.  OK, but the trouble with live data is that it is real and it does not belong to you. […]

IBM i Data Security: Are you Sitting Comfortably?

Test Data solved in four steps 1. Extract, 2. Scramble, 3. Verify, 4. Roll-back The IBM i has arguably the best security record of any business application platform in common use. A great place to be if you have one.  But pressures on data security have increased dramatically in the last few years with greater penalties for […]