Information Security Leader, Author, Instructor and Speaker

Default utility Image

4 enterprise database security best practices TAGS: The importance of securing sensitive information cannot be denied. Fortunately, most organizations today have solid cybersecurity programs that use a …Continue reading →

Default utility Image

Webcast: Content Monitoring in the Enterprise TAGS: | | | From data loss prevention to database activity monitoring and digital rights management, there are a bewildering variety of technologies available …Continue reading →

Default utility Image

Vaccinate Your Website Against SQL Injection TAGS: | On Dec. 26, 2007, Albert Gonzalez, a 28-year-old resident of Miami, launched an attack against the database servers of Heartland …Continue reading →

Default utility Image

Five tips for secure database development TAGS: The secure operation of a database server requires a cooperative effort among IT professionals responsible for the secure operation of …Continue reading →

Default utility Image

SQL Server user-security checklist TAGS: As DBAs, security is not usually a primary concern. Connectivity and availability are more immediate concerns, but unless you want …Continue reading →

Default utility Image

Preventing SQL Injections TAGS: | Technical professionals responsible for the security of publicly accessible Internet servers often focus (justifiably) on maintaining the operating system and …Continue reading →