To enhance our website and services, we use Google Analytics, which requires your consent below to gather data about your device and site usage. Your data may be transferred outside the EU by Google, where regulations may differ. Consent is voluntary and revocable by contacting us.
Essential cookies are strictly necessary for site operation. For details on cookie usage as well as how we process your data, please read our policy.
Applications such as databases are often neglected when securing a network, however, they are often visible and therefore subjectable to attack externally. The "weakest link" theory has meant that databases have seen a huge increase in security "research" over recent years. It is imperative that you are aware of the security issues in using databases. Having a DBA is not always sufficient and my experience has found that it is the DBA's that are often the cause of many security issues such as roles within roles and privilege runaway.