2 min listen
Track Your Consultants
FromVoice of the DBA
ratings:
Length:
3 minutes
Released:
Mar 29, 2016
Format:
Podcast episode
Description
If you pay attention to security issues in software, you've probably heard about man-in-the-middle attacks. These can occur more frequently than you expect, though inside of a company, it's more unlikely that you'll experience one if you have some fairly basic security controls on your network.
However, if you invite someone inside of your network, such as a consultant of some sort, you should be more vigilent. There's a great post showing how someone can execute a MITM attack against SQL Server. It's in depth, showing exactly how packet captures lead to the ability to hijack a session and create a new login.
Read the rest of "Track Your Consultants"
However, if you invite someone inside of your network, such as a consultant of some sort, you should be more vigilent. There's a great post showing how someone can execute a MITM attack against SQL Server. It's in depth, showing exactly how packet captures lead to the ability to hijack a session and create a new login.
Read the rest of "Track Your Consultants"
Released:
Mar 29, 2016
Format:
Podcast episode
Titles in the series (89)
If or When?: I saw this post recently about security and preparing for a data breach. The title caught my eye because it implies that we're all doomed. Do the rest of you think that? Is it a question of when we'll have a security breach not if? Given the... by Voice of the DBA