Security School: Database security issues

Database Security Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TJX data breach faces FTC probe

    The Federal Trade Commission (FTC) confirmed it is investigating events surrounding the data breach at TJX Companies Inc. TJX says it is cooperating with investigators. 

  • Gartner: IT departments lack finances to protect data

    A new Gartner report says 15 million consumers were victimized by identity theft over 12 months, because companies keep making mistakes like those made by TJX. 

  • Database security undermined by protocol loopholes, lax defenses

    A database security vendor says database client-server protocols are being targeted by attackers. An analyst says enterprises are adding defenses. 

  • Where's Larry? Ellison calls out sick at RSA Conference

    Despite the Oracle CEO's no-show, the database software giant talked up its framework for secure data sharing; meanwhile, CA's CEO called for simplified security products. 

  • Keynoters speak volumes

    Times have changed, and RSA Conference keynote speakers no longer need cryptography and security backgrounds. This year's headliners include several rock stars of the IT industry, along with some newcomers and several old veterans. 

  • Do XPath injection attacks require the same response as SQL injections?

    XPath injection attacks are slightly different (and more dangerous) than SQL injections. In this SearchSecurity.com Q&A, application expert Michael Cobb reveals the preventative steps that can protect your systems from either type of assault. 

  • Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... 

  • Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... 

  • Oracle releases 51 security fixes

    The flaws are across Oracle's product line and attackers could exploit them remotely to compromise vulnerable systems. 

  • Oracle emulates Microsoft with advance patch notice

    Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.