{"id":71415,"date":"2025-01-24T13:35:46","date_gmt":"2025-01-24T11:35:46","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=71415"},"modified":"2025-03-13T17:58:40","modified_gmt":"2025-03-13T15:58:40","slug":"top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/","title":{"rendered":"Top 5 Common Security Vulnerabilities on IBM i (and How to Avoid Them)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h3 class=\"\" style=\"text-align: center; margin-top: 10px; margin-bottom: 20px; font-size: 15px; --fontsize: 15; line-height: 1.3; --minfontsize: 15;\" data-fontsize=\"15\" data-lineheight=\"19.5px\">by Michel Mouchon<\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;\"><p>Even though the IBM i is renowned for its reliability and robustness, it remains vulnerable to certain security flaws. With the evolution of cyber threats, some of these vulnerabilities can go unnoticed, endangering systems and sensitive data. <\/p>\n<p>Here are the <b>top 5 vulnerabilities<\/b>, their impacts, and ways to prevent them.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<div class=\"fusion-text fusion-text-3\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">1. SQL Injection: A Persistent Threat<\/h2>\n<p><b>SQL injection<\/b> is among the most widespread vulnerabilities across all platforms, including the i. SQL injection allows cyber attackers to execute malicious SQL queries to manipulate or steal your data.<\/p>\n<h3 class=\"\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\" data-fontsize=\"20\" data-lineheight=\"26px\">Consequences:<\/h3>\n<ul>\n<li>Unauthorized access to databases<\/li>\n<li>Theft of sensitive information<\/li>\n<\/ul>\n<h3 class=\"\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\" data-fontsize=\"20\" data-lineheight=\"26px\">How to avoid it?<\/h3>\n<ul>\n<li>Use prepared statements or ORM (Object-Relational Mappers) to secure your database.<\/li>\n<li>Detect vulnerabilities with tools like <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a>.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\"><strong>Tip:<\/strong> <\/b>Train your development team on the best practices for writing SQL statements and handling user input to minimize risks.<\/i><\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2 data-fontsize=\"30\" data-lineheight=\"36px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\">2. Exposed API Vulnerabilities<\/h2>\n<p>With the increased use of <b>APIs<\/b>, security is often neglected. Poorly configured or insufficiently protected APIs become prime targets for attacks.<\/p>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">Consequences:<\/h3>\n<ul>\n<li>Data breaches involving client information<\/li>\n<li>Service interruptions<\/li>\n<\/ul>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">How to avoid it?<\/h3>\n<ul>\n<li>Implement robust authentication mechanisms like OAuth.<\/li>\n<li>Perform regular API scans using automated tools such as <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a>.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Good to know: <\/b>Clear and regularly updated API documentation is a good first step toward better security.<\/i><\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2 data-fontsize=\"30\" data-lineheight=\"36px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\">3. Insecure Code which Doesn\u2019t Follow Standardized Practices<\/h2>\n<p><b>Source code,<\/b> often exempt from rigorous reviews, can accumulate errors exploitable by attackers. The less standardized this code is, the more difficult it becomes to fix.<\/p>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">Consequences:<\/h3>\n<ul>\n<li>Creation of backdoors<\/li>\n<li>Accumulation of technical debt<\/li>\n<\/ul>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">How to avoid it?<\/h3>\n<ul>\n<li>Analyze code with tools like <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a> to help standardize a set of best practices.<\/li>\n<li>Incorporate regular code reviews into your DevOps processes.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Advice: <\/b>Automate quality checks to limit recurring errors.<\/i><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">4. Weak System Configurations<\/h2>\n<p><b>Default settings<\/b> or <b>insecure configurations<\/b>, such as standard passwords or unused ports, increase the risk of intrusion.<\/p>\n<h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\" data-fontsize=\"20\" data-lineheight=\"26px\">Consequences:<\/h3>\n<ul>\n<li>Unauthorized system access<\/li>\n<li>Exploitation of system vulnerabilities<\/li>\n<\/ul>\n<h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\" data-fontsize=\"20\" data-lineheight=\"26px\">How to avoid it?<\/h3>\n<ul>\n<li>Regularly review and update configurations.<\/li>\n<li>Remove unused or insecure settings.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Tip:  <\/b><\/i>Adopt a configuration validation process before any production deployment.<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><h2 data-fontsize=\"30\" data-lineheight=\"36px\" class=\"\" style=\"--fontsize: 30; line-height: 1.2;\">5. Lack of Regular Security Testing<\/h2>\n<p><b>Security testing<\/b> is often neglested, leaving vulnerabilities undetected for extended periods.<\/p>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">Consequences:<\/h3>\n<ul>\n<li>Prolonged exposure to unknown threats<\/li>\n<li>Non-compliance with regulations<\/li>\n<\/ul>\n<h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"\" style=\"--fontsize: 20; line-height: 1.3; --minfontsize: 20;\">How to avoid it?<\/h3>\n<ul>\n<li>Schedule regular penetration tests.<\/li>\n<li>Use <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a> to automate security analyses throughout the development cycle.<\/li>\n<\/ul>\n<p class=\"astuce\"><i><b style=\"color: #437cb4;\">Good to know: <\/b><\/i>Regular testing is required to comply with standards like GDPR.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-margin-top:50px;\"><h3 data-fontsize=\"20\" data-lineheight=\"26px\" class=\"fusion-responsive-typography-calculated\" style=\"--fontSize: 20; line-height: 1.3; --minFontSize: 20;\">Conclusion<\/h3>\n<p>Securing applications is essential for protecting your systems and data. By identifying and addressing vulnerabilities like SQL injections or API flaws, and leveraging powerful tools like <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARCAD CodeChecker<\/a>, you can significantly reduce risks. Be proactive and ensure the security and quality of your applications today!<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-column-inner-bg-wrapper cta-box\" style=\"--awb-padding-top:25px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-inner-bg-color:var(--awb-color1);--awb-inner-bg-color-hover:var(--awb-color1);--awb-inner-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-border-color:#ea5050;--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:60%;--awb-margin-top-large:25px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:15px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-margin-bottom:5px;\"><p>Secure your IBM i application code now!<\/p>\n<\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin cta\" style=\"--awb-text-color:#ea5050;--awb-margin-bottom:5px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p>Discover ARCAD CodeChecker<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-left:25px;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-width-large:51%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.7647058823529%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.7647058823529%;--awb-width-medium:51%;--awb-order-medium:0;--awb-spacing-right-medium:3.7647058823529%;--awb-spacing-left-medium:3.7647058823529%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:5px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:9.6%;--awb-width-small:20%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:9.6%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:130px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><img decoding=\"async\" width=\"200\" height=\"200\" alt=\"Michel Mouchon\" title=\"Michel Mouchon\" src=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon.png\" class=\"img-responsive wp-image-70818\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon-66x66.png 66w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon-150x150.png 150w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2024\/12\/michel-mouchon.png 200w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_3_4 3_4 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:80%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:2.4%;--awb-spacing-left-small:2.4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:22;--minFontSize:22;line-height:1.3;\">Michel Mouchon<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:0px;--awb-margin-bottom-small:10px;--awb-font-size:16px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.36;\">CTO and VP of Strategy<\/h4><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\" style=\"--awb-font-size:15px;--awb-line-height:1.4;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Technical Director at ARCAD Software since 2000, Michel Mouchon plays a key role in the company\u2019s technical strategy and coordination of R&amp;D, engineering, and consulting teams. As a DevOps expert, he focuses on modernizing applications, methods, and tools. Holding dual degrees in electronics and software engineering, Michel has versatile IT skills. His communication talent and expertise are widely recognized within the international IBM i community.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.<\/p>\n","protected":false},"author":16,"featured_media":71386,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[219],"tags":[616,563,371,369],"class_list":["post-71415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-blog-en","tag-blog-article","tag-ibm-i-devops","tag-ibm-i-modernization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Common Security Vulnerabilities on IBM i<\/title>\n<meta name=\"description\" content=\"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Common Security Vulnerabilities on IBM i\" \/>\n<meta property=\"og:description\" content=\"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-24T11:35:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T15:58:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"298\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\"},\"headline\":\"Top 5 Common Security Vulnerabilities on IBM i (and How to Avoid Them)\",\"datePublished\":\"2025-01-24T11:35:46+00:00\",\"dateModified\":\"2025-03-13T15:58:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/\"},\"wordCount\":3064,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"keywords\":[\"blog\",\"Blog Article\",\"DevOps for IBM i\",\"IBM i Modernization\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/\",\"name\":\"Top 5 Common Security Vulnerabilities on IBM i\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"datePublished\":\"2025-01-24T11:35:46+00:00\",\"dateModified\":\"2025-03-13T15:58:40+00:00\",\"description\":\"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/5-vulnerabilites-securite-ibm-i.png\",\"width\":800,\"height\":298,\"caption\":\"IBM i security vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Common Security Vulnerabilities on IBM i (and How to Avoid Them)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\",\"name\":\"Myriam Goutte\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/myriam-goutte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Common Security Vulnerabilities on IBM i","description":"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Common Security Vulnerabilities on IBM i","og_description":"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.","og_url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2025-01-24T11:35:46+00:00","article_modified_time":"2025-03-13T15:58:40+00:00","og_image":[{"width":800,"height":298,"url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730"},"headline":"Top 5 Common Security Vulnerabilities on IBM i (and How to Avoid Them)","datePublished":"2025-01-24T11:35:46+00:00","dateModified":"2025-03-13T15:58:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/"},"wordCount":3064,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","keywords":["blog","Blog Article","DevOps for IBM i","IBM i Modernization"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/","name":"Top 5 Common Security Vulnerabilities on IBM i","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","datePublished":"2025-01-24T11:35:46+00:00","dateModified":"2025-03-13T15:58:40+00:00","description":"Discover the 5 most common security vulnerabilities on IBM i and how to avoid them to protect your data and applications from attacks.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/01\/5-vulnerabilites-securite-ibm-i.png","width":800,"height":298,"caption":"IBM i security vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Top 5 Common Security Vulnerabilities on IBM i (and How to Avoid Them)"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730","name":"Myriam Goutte","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/myriam-goutte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/71415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=71415"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/71415\/revisions"}],"predecessor-version":[{"id":71461,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/71415\/revisions\/71461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/71386"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=71415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/categories?post=71415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/tags?post=71415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}