Category: Security


Database Security

Data Protection: Culture, Tools, People, and Roles

In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection tools, people, and roles I recommend to successful organizations. Tools Given the volume and …



Protection Methods – The Art of Data Analytics

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …