While more organizations are migrating their critical workloads to the cloud for scalability and agility, the ever-increasing complexity of the cloud environment makes it more challenging to secure that environment. The ramifications of a data breach or cyberattack can be…
Read More >Today, any guidance you get about data security will almost certainly include the recommendation to adopt zero trust. It’s good advice. It makes sense that anything accessing your network should be verified and that no device should be trusted by…
Read More >“The value of an idea lies in the using of it.” — Thomas Edison Previously, many ideas were used and shared in classic “water cooler” situations – bumping into colleagues in the hall, sharing a coffee or even washing hands…
Read More >Database unavailability or outright failure is no joke. Not only do such incidents often cause massive internal stress (along with the inevitable blame game between IT staff), but they can also negatively impact business outcomes and lead to dissatisfied or…
Read More >The Oracle Database Security Assessment Tool (DBSAT) is a command-line tool focused on identifying how securely the database is configured and where sensitive data resides with the goal of promoting successful approaches to mitigating potential security risks. DBSAT requires no…
Read More >