Get a Pentest and security assessment of your IT network.

News

App And Database Security: Two Halves Of A Whole

The front-end application and the back-end database are inextricably bound in our current model. One of the biggest weaknesses in this model is when the pathways to data aren’t properly controlled. DBAs have the power to take the driver’s seat in this interaction by not giving carte blanche to the developers. The rule of least privilege shouldn’t be instituted for only end users, says Chris Eng, vice president of research for Veracode. Eng: “Developers definitely need to shoulder their share of the responsibility, too””]

Source: https://www.darkreading.com/database-security/app-and-database-security-two-halves-of-a-whole

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones