Most organisations invest in perimeter security. The database – where the data actually lives – is the layer most often left ungoverned.
Get the best South African technology news and analysis delivered to your e-mail inbox every morning.
Most organisations invest in perimeter security. The database – where the data actually lives – is the layer most often left ungoverned.
South Africa’s breach record tells a consistent story – and it leads to the database layer, writes Ascent Technology MD Johan Lamberts.
TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.
