New & Notable
Database Security Management News
August 07, 2014
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
July 18, 2014
With another round of patches for several serious Java flaws, Oracle's quarterly CPU showed that Java security problems are not receding.
January 27, 2014
A researcher says Oracle hasn't properly addressed long-standing Oracle Forms and Reports flaws, which could be exploited to gain remote access.
January 21, 2014
The first Oracle Critical Patch Update of 2014 included fixes for 36 Java vulnerabilities, but only 5 Oracle Database vulnerabilities. Why so few?
Database Security Management Get Started
Bring yourself up to speed with our introductory content
Expert Michael Cobb discusses how to identify the data egress points in enterprise databases to prevent malicious data exfiltration. Continue Reading
A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data... Continue Reading
Link encryption (sometimes called link level or link layer encryption) is the data security process of encrypting information at the data link level as it is transmitted between two points within a network. Continue Reading
Evaluate Database Security Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Database security specialist DB Networks introduces SQL security appliance to detect obfuscated malicious traffic. Continue Reading
Expert Michael Cobb examines the open source cloud computing platform OpenStack and relevant OpenStack security issues. Continue Reading
Database activity monitoring can help with security and compliance by tracking everything going on in the database. Continue Reading
Manage Database Security Management
Learn to apply best practices and optimize your operations.
Expert Mike Chapple details the necessary database security controls that an organization must implement to achieve a PCI-compliant database. Continue Reading
Trust, but verify. Ronald Reagan made it popular, and it's certainly relevant for DBAs in today's consolidated, virtualized IT world. Continue Reading
Search is a key discipline for security log management. John Burke explains how to better search log files to improve security event log management. Continue Reading
Problem Solve Database Security Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis explains how the Narilam malware infects SQL databases and destroys corporate records, and offers advice on mitigation. Continue Reading
With NoSQL databases increasingly being used to tackle big data challenges, expert Michael Cobb examines NoSQL security in comparison to RDBMS. Continue Reading
Matt Pascucci explains what to look for in full-packet-capture network logging and network forensic tools, and areas to focus on during the search. Continue Reading