Viewing 15 posts - 4,336 through 4,350 (of 6,035 total)
What these retailers need is encryption capability embedded in the card scanner devices. This is so obvious, I'm sure it's already an option. The further upstream data is encrypted, then...
October 31, 2014 at 10:34 am
Home Depot's "We sell hammers" quote in response to implementing security comes to mind.
Home Depot's corporate and IT headquarters are based here in Atlanta. I almost took a job offer...
October 31, 2014 at 10:28 am
Solomon Kane, because the character isn't that common at conventions and parties, and on some level I self identify with him.
October 31, 2014 at 6:51 am
dbishop (10/30/2014)
October 31, 2014 at 6:36 am
GoofyGuy (10/30/2014)
Imagine having 100 former "script kiddies" all tethered together along a stretch of highway in the New Mexico desert, digging ditches for fibre optic cable. Let them do that...
October 30, 2014 at 11:55 am
Miles Neale (10/30/2014)
I guess I have a different take on this. We appear to be operating under a broken understanding of crime and punishment. We look at...
October 30, 2014 at 11:10 am
The question is, would you know if you've been hacked?
If we can define what exactly it means to be "hacked", then we can successfully guard against it and detect it...
October 30, 2014 at 10:22 am
Robert.Sterbal (10/30/2014)
October 30, 2014 at 7:36 am
The impression I get is that most of these hacks targeting big retailers are actually not database penetrations. Malware gets installed on the Point Of Sale terminals, which then skims...
October 30, 2014 at 7:05 am
salvatore.contino (10/27/2014)
October 27, 2014 at 10:04 am
salvatore.contino (10/27/2014)
October 27, 2014 at 8:58 am
The following can be used to identify what objects are currently consuming space in tempdb (the name of each temp table and it's size) and what sessions are allocating the...
October 27, 2014 at 7:29 am
So, who here thinks the move to 3rd party hosted database services will eventually make the position of SYSADMIN a toaster? :unsure:
October 24, 2014 at 8:16 am
By "toaster", I'm assuming we mean a piece of very vertical software that performs a common function, is based on publicly available source code, can be easily duplicated, and leaves...
October 24, 2014 at 6:54 am
Not only is there a high frequency of events, but there's also a number of new presentations to build. It seems I have 3-4 (at least) new talks to assemble,...
October 21, 2014 at 8:08 am
Viewing 15 posts - 4,336 through 4,350 (of 6,035 total)