Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Database Threats 101: Weak Audit


Published on

In this edition of SecuritySHORTS, we examine a common database vulnerability that emanates directly from an organization's decision to not turn on all database spotlights. The resulting "weak audit," creates an enticing opportunity for malicious insiders to steal valuable data because they know they are not being watched. This short video answers three key questions: 1. What are the reasons for a weak audit? 2. What are the consequences of a weak audit? 3. How should organizations address this problem?

Published in: Technology
  • Be the first to comment

  • Be the first to like this