Hearing Responsibility

A while ago I was watching Shark Tank on TV and at one point Robert Herjavich (T|B) made the great quote above. When I heard that statement I stopped the show immediately. I went back (Thank you whoever made rewindable TV possible!) and listened to it again to make sure I got it right. That one little statement really got …

STIGs Image

DoD STIGs – V-32534

Overview: Title: The DBMS must take needed steps to protect data at rest and ensure confidentiality and integrity of application data. Vulnerability ID: V-32534 STIG ID: IA Controls: None Severity: medium Description: This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers …


PASS Summit 2016 – My Session Evaluations

No Sessions For You! The announcements of the speakers and sessions selected for the PASS Summit 2016 were recently announced, and I was not picked for any sessions. I do not have any ill feelings to those that go through the herculean effort to create the reviews and the Summit in general. Am I upset & disappointed? Sure, who wouldn’t …

STIGs Image

DoD STIGs – V-32185

Overview: Title: The application must employ automated mechanisms to facilitate the monitoring and control of remote access methods. Vulnerability ID: V-32185 STIG ID: IA Controls: None Severity: medium

STIGs Image

DoD STIGs – V-32442

Overview: Title: The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). Vulnerability ID: V-32442 STIG ID: IA Controls: None Severity: medium Description: To assure accountability and prevent unauthorized access, organizational users shall be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees …

STIGs Image

DoD STIGs – V-32528

Overview: Title: The DBMS must fail to a known safe state for defined types of failures. Vulnerability ID: V-32528 STIG ID: IA Controls: None Severity: medium Description: Failure in a known state can address safety or security in accordance with the mission/business needs of the organization. Failure in a known secure state helps prevent a loss of confidentiality, integrity, or …