Tag Archives: security

Security Convenience

I wrote a question of the day recently that seemed to catch many people. The question had to do with mapping users when a login isn’t specified in the call. The behavior is to auto match existing logins with the same name. … Continue reading

Posted in Editorial | Tagged | Comments Off on Security Convenience

Hacking to Hide

It’s probably no surprise to you that the black boxes for ships are vulnerable to hacking. These are the Voyage Data Recorders (VDR) that should capture telemetry, audio recordings, and more. These devices are really computers now, connected to the onboard … Continue reading

Posted in Editorial | Tagged | Comments Off on Hacking to Hide

The End of 2015

I’m off on vacation, so I won’t be able to respond, but I decided to take a few minutes and look back at 2015 before leaving for the year. This was a year that seems to have been marked by … Continue reading

Posted in Editorial | Tagged , , | Comments Off on The End of 2015

Why Use the Principle of Least Privilege?

This editorial was originally published on April 12, 2011. It is being re-run as Steve is away on vacation. SQL Injection is not the fault of the SQL Server. Brian Kelley pointed that out, and reminded me that SQL Injection isn’t … Continue reading

Posted in Editorial | Tagged | Comments Off on Why Use the Principle of Least Privilege?