Controls are Needed on Recoveries from Backup

Some organizations completely ignore important aspects of the backup recovery and validation process. This creates a significant ongoing data security vulnerability. I have never seen a backup label that identified the owner of the data when the backup was created, nor one that indicated whose authorization is needed before the backup is actually recovered. Making the […]

Read More >>

How Do I Reset the Master Password?

In my time in enterprise-level support, I was often asked how to reset the master password on various devices after the existing password had been lost for one reason or another. Most people requesting that information were surprised when I asked for an independent person to validate both the need for the reset and that […]

Read More >>

Secure Coding 201: Does it Exist?

Something I hear continually is that recent computer science graduates have not even been introduced to the notion of secure coding. They may have been taught to program in half a dozen different languages and styles, but their assignments have never been run through a static code checker to validate that all the best practices […]

Read More >>