Be the first to like this
In this edition of SecuritySHORTS, we examine a common database vulnerability that emanates directly from an organization's decision to not turn on all database spotlights. The resulting "weak audit," creates an enticing opportunity for malicious insiders to steal valuable data because they know they are not being watched. This short video answers three key questions: 1. What are the reasons for a weak audit? 2. What are the consequences of a weak audit? 3. How should organizations address this problem?