Database Evaluation for Security and Audits

There are usually many security layers above that of the database, from a security standpoint, one cannot rely on any other layers or ignore others. This is true no matter where in the tech stack one's core responsibility is located. When it comes to protecting sensitive data there are no shortcuts or any single catchall …

Continue reading Database Evaluation for Security and Audits