Security

Category: security

Where Do Data Breaches Come From?

Where Do Data Breaches Come From?

By Kendra Little on December 3, 2018

Category: security

I recently did a bit of research on the source of data breaches. In this post, I’ll talk a bit about my current favorite source for breach information, and a bit of what I learned.

Continue reading

Join Me for an Upcoming Webinar on Data Masking: Insights and Actions

Join Me for an Upcoming Webinar on Data Masking: Insights and Actions

By Kendra Little on November 21, 2018

Category: security

Click the image to register for the webcast

There Has Never Been a Better Time to Start a Project to Champion Data Privacy

In a recent Harris poll sponsored by the payment company Stripe, over 1,000 C-level executives were asked to rate which factors they feel are most threatening to their business.

The #1 item that executives rated as “somewhat” or “very” threatening to the success of their business isΒ security / data breaches. The #2 rated threat to these businesses? Increased regulation.Β 

Continue reading

The Right to Be Erased is Coming to California, Along with Other Privacy Rights

The Right to Be Erased is Coming to California, Along with Other Privacy Rights

In the last year, developers and DBAs have heard a lot about the General Data Protection Regulation (GDPR) law passed by the European Union. These regulations not only impact companies that are incorporated in Europe, but all companies processing the data of Europeans.

Continue reading

Checking Permissions on Linked Servers

Checking Permissions on Linked Servers

By Kendra Little on April 21, 2009

Category: security

One reason I started this blog was just the idea of going through my catalog of scripts and reviewing them and sharing out what might be useful to people.

Here is a quick one I put together a while back. I was starting to work with a group of servers [at an unnamed company, always an unnamed company!]. Some of the instances had been configured long ago, and I found some linked servers where passwords had been hardcoded into the login mappings.

Continue reading