How to prevent man in the middle SQL injection attacks

As a SQL engineer with an interest in security I’m convinced that security is a concept that should be implemented throughout an organization. Just placing a (properly configured) firewall and forcing password policies doesn’t suffice. In light of that last statement I wondered whether or not it was possible to gain access to a MS …

Continue reading "How to prevent man in the middle SQL injection attacks" »