data access
Breaking the Chain of Data Access: The Importance of Separating Human and Application Users
Data, the lifeblood of any organization, relies on the database as its beating heart. As a result, businesses invest heavily in designing and monitoring all access to it. In traditional literature, there ...
Baffle’s Proxy Architecture
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing ...
CIS Control 3: Data Protection
For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it ...
Major Provider of Cloud IoT Devices Breached
Ubiquiti, a global IoT device vendor, suffered a major data breach involving the PII of its customers. The post Major Provider of Cloud IoT Devices Breached appeared first on Sonrai Security ...
When Do You ‘Exceed’ Your Authorization to Use Computer Data?
The law is murky on what constitutes legal authorization and use of computer data In Greek mythology, Cassandra was cursed with the ability to know the future, and with the inability to ...
Is a Ransomware Attack a Reportable Data Breach?
One question that vexes security engineers, incident responders and lawyers is whether a ransomware attack constitutes a reportable data breach under any of the various data breach disclosure laws, regulations or other ...
The Importance of Implementing an Information Security Policy That Everyone Understands
Information security (IS) and/or cybersecurity (cyber) are more than just technical terms. They’re the processes, practices and policy that involve people, services, hardware, and data. In particular, IS covers how people approach ...
Access Governance Helps Ensure Network Security Compliance
Protecting your company’s priceless data means making sure of two things: that the right people have access to the correct files and applications, and that the wrong people don’t have access to ...
Understanding Single Sign On as a Means of Identity Access Management
I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created ...
Best of 2019: Privacy Regs Changing the Face of Cybersecurity
As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the second in our weeklong series of the Best of ...