Why Protect Data Against A Malicious Root User?

Why Protect Data Against A Malicious Root User? These days attacks that are being launched on an organization’s computing infrastructure […]

What Triggers A Breach Notification Under The HIPAA/HITECH Act?

Let’s first review few items before we discuss when a breach notification is triggered. HIPAA: The Health Insurance Portability and […]

What Are The Main Motivations Of An Attacker?

[caption id="attachment_4673" align="aligncenter" width="780"] Main Motivations of an Attacker[/caption] Technical Motivations of an Attacker: 1) Data theft 2) Data tampering […]

How to Protect PHI Stored in a MySQL Server?

Unlike end-user workstations, mission-critical application servers like MySQL are high value targets. The MySQL database depends on the operating system […]