Analyzing Database content

The last post of the DataMasking Project Diary was about the process of identifying where sensitive data is. As this is a complex topic, we are still missing some more relevant information about how to analyze databases and its content, that is today’s post topic. We want to localize sensitive data. In order to do … Read more

Reinforced door, the keys at building desk

For some years now, armored doors are common in the access to houses. It can be said that it is a reasonable security measure, in terms of efficiency (security results obtained against cost). I do remember that for a long time these new doors coexisted with the old practice of leaving a copy of the … Read more