Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

7/11/2019
08:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

There’s a Security Incident in the Cloud: Who’s Responsible?

It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
DynamicData
50%
50%
DynamicData,
User Rank: Apprentice
7/14/2019 | 6:27:23 AM
An alternative to the 'surveillance approach'
Software applications usually have 3 main components:

1.  Database

2.  Application server (website)

3.  User device

Today, most software today a password to reach the Application server, and the Application server has full access to the Database.

That means anyone who has access to the Application server, including a user on a poorly written software system, has full access to the Database.

 

I have written software (off and on) for 36 years.  Please write software with this:

https://dls.97.double.in.th

(The site is under construction, but the Demo is complete.)

 
The Edge Cartoon Contest: Need a Lift?
Flash Poll