Businesses have a long way to go in protecting their applications but even farther to go in securing those applications’ rear end—databases. While insecure applications provide a conduit for attack, the confidential data sought by thieves resides in the database. To illustrate why databases deserve the same security scrutiny as their more visible application front end, Josh will walk attendees through a case study of an attack originating with the exploitation of a web application and resulting in the compromise of a database. From there Josh will detail a number of immediate actions you can take to significantly decrease the vulnerability of your databases.
October 21, 2014 | Tech 1 (718a) | 11:30 – 12:00