Email Alerts
-
DBMS security: Data warehouse advantages
Are there data warehouse advantages in regard to security? Without question. Michael Cobb explains. Ask the Expert
-
Tips for writing secure SQL database code
Writing secure code is always a challenge, but it is particularly necessary for SQL databases that would otherwise be vulnerable to SQL injection attacks. Get tips on how to write secure SQL database code in this expert response. Ask the Expert
-
What is the best database patch management process?
Michael Cobb reviews how to handle database patches in the enterprise. Ask the Expert
-
Is credit card tokenization a better option than encryption?
Platform security expert Michael Cobb reviews alternatives to encryption that will help protect sensitive data. Ask the Expert
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation. Ask the Expert
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why? Ask the Expert
-
How to prevent operating system cloning with AES 256-bit encryption
Reading a binary image file and cloning a system can lead to serious data loss. Learn how to prevent this from happening with this advice from network security expert Mike Chapple. Ask the Expert
-
Are there guidelines to create a HIPAA-compliant data center?
Are there specific guidelines for creating a HIPAA compliant data center? In this expert response, security management expert David Mortman suggests resources to boost compliance. Ask the Expert
-
How to create configuration management plans to install DLP
Installing DLP products on a network can require a lot of configuration management planning that includes cooperation between many business groups. In this security management expert response, learn how to do a network architecture review to install ... Ask the Expert
-
When should a database application be placed in a DMZ?
Mike Chapple explains the best network location for an important database application. Chapple also reveals the appropriate level of access to grant remote users. Ask the Expert
Security Management Strategies for the CIO