Most organisations invest in perimeter security. The database – where the data actually lives – is the layer most often left ...