Email Alerts
-
Is your site vulnerable to SQL injection attacks?
SQL injection exploits may soon be as common as those targeting Windows and Unix flaws, experts say. An estimated 60% of Web applications that use dynamic content are likely vulnerable, with devastating consequences for an enterprise. Learn how to re... Article
-
Automated SQL injection: What your enterprise needs to know, part 2
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk. Article
-
Security issues of using shared code
Security pros need to be aware of code that is being "borrowed" for custom applications. Tip
-
Automated SQL injection: What your enterprise needs to know
SQL injection exploits may soon be as common as those targeting Windows and Unix flaws, experts say. An estimated 60% of Web applications using dynamic content are likely vulnerable, with devastating consequences for an enterprise. A presentation of ... Article
-
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack. News
-
Five tips for secure database development
A look at some of the specific security issues that impact the application development process. Tip
-
SQL Server user-security checklist
Here are a few quick steps to assess the security of user accounts/permissions on your SQL Server. Tip
-
Database security tools for preventing SQL injection attacks
An emerging breed of database security tools is helping security teams spot attackers' favorite techniques, like SQL injection. Column
-
Oracle announces fixes for two Oracle9i vulnerabilities
Oracle has announced two vulnerabilities in its Oracle9i database, which put users at risk for session hijacking and denial of service attacks. Article
-
Slammer lessons remain valid a year later
This weekend marks the one-year anniversary of the debut of the SQL Slammer worm, an infamous time in information-security annals. Experts remind administrators that the lessons learned a year ago remain relevant today. Article
Security Management Strategies for the CIO