Email Alerts
-
Prevent a privilege escalation attack with database security policy
Privilege escalation attacks are dangerous wherever they occur, but can be particularly harmful if run in a database. Learn more from threats expert Nick Lewis. Ask the Expert
-
Database application security: Balancing encryption, access control
Database applications are often the epicenter of a company's sensitive data, so security is paramount, but maintaining a balance between security and business use can be tricky. In this tip, Andreas Antonopoulos discusses encryption strategies for da... Tip
-
Database security: Top 10 database vulnerabilities list
New vulnerabilities list outlines the most common database problems that could lead to a costly data breach. News
-
Oracle buys database firewall vendor Secerno
Oracle said the deal adds the Secerno database activity monitoring functionality to its line of database server security technologies. Article
-
DBMS security: Data warehouse advantages
Are there data warehouse advantages in regard to security? Without question. Michael Cobb explains. Ask the Expert
-
Tips for writing secure SQL database code
Writing secure code is always a challenge, but it is particularly necessary for SQL databases that would otherwise be vulnerable to SQL injection attacks. Get tips on how to write secure SQL database code in this expert response. Ask the Expert
-
Database activity monitoring lacks security lift
IBM's acquisition of Guardium does not validate DAM as a viable security market segment. The market has been hyped, says security expert Eric Ogren. Column
-
IBM to acquire database security firm Guardium
Deal reportedly worth $225 million. Article
-
What is the best database patch management process?
Michael Cobb reviews how to handle database patches in the enterprise. Ask the Expert
-
Content-aware IAM: Uniting user access and data rights
In the world of IT security, IAM and data protection have generally kept to their separate corners. That trend, however, may be shifting with the onset of content-aware IAM that merges granular user access with advanced data protection. Tip
Security Management Strategies for the CIO