Welcome!

Data Security Simplified

Sol Cates

Subscribe to Sol Cates: eMailAlertsEmail Alerts
Get Sol Cates via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Sol Cates

Since the advent of the SuperUser, there has been a thorn in the side of Information Security. Administrators must be able to perform system management functions, but systems have been designed to grant them access far beyond what they actually need to do their jobs. As a result, IT has had to come up with crafty ways to help mitigate who has access to privileged accounts and the underlying data in those accounts. They have tried everything from password management, to keystroke logging, to change control procedures, to privileged user management (such as sudo, powerbroker, etc.). However, all of these approaches have focused on either "who" can become a privileged user or "how" they can access sensitive data. In essence, they've been missing the point, which is much more about what the privileged user is able to do with data. If you are wrestling with how to mitiga... (more)