Why Protect Data Against A Malicious Root User?

Why Protect Data Against A Malicious Root User? These days attacks that are being launched on an organization’s computing infrastructure […]

What Triggers A Breach Notification Under The HIPAA/HITECH Act?

Let’s first review few items before we discuss when a breach notification is triggered. HIPAA: The Health Insurance Portability and […]

How To Reduce Exposure To Your MySQL Server At The OS Layer?

Let’s first look at the three main OS level vulnerabilities that allow an attacker to breach security and get to […]