Historically, database auditing and database performance have been like oil and water; they don’t mix. So auditing is often eliminated, because performance drag on critical systems is unacceptable. In ...
Auditing database activity is a core component to any data security program. Databases capture data access and alterations during transaction processing, along with modifications to the database ...
One of the major drivers behind auditing is compliance. The Health Insurance Portability and Accountability Act in the U.S. requires that healthcare providers deliver audit trails about anyone and ...
Time may seem scarcer than ever, but fortunately technological advancements have presented auditors with many tools to improve the effectiveness and efficiency of audits. One such tool is data ...
David Litchfield presented "Hacking and Forensicating an Oracle Database Server" at the Black Hat 2011 conference. During the presentation, Litchfield discussed a handful of ways to hack into Oracle ...
Over 158 million personal data records have been exposed since February 2005. There is no question that databases are under attack. No longer satisfied with defacing Web sites or committing other ...
Data sovereignty is a hot topic. For commercial and public sector organisations, compliance to ensure personal data is secure is a primary objective. And that means it cannot be subject to foreign ...
Big Data is powerful. It can also be daunting. The current data analytic landscape focuses on the use of “scripts” that can identify duplicates and quantitative outliers. Yet, there is little guidance ...
The University at Buffalo fully cooperates with and assists external auditors and investigators. The UB Internal Audit Office is the designated point of contact and coordinates external audit activity ...