Email Alerts
-
Differences between an SAS 70 data center and a Tier III data center
Learn what the difference is between an SAS 70 data center and a Tier III data center and the strengths and weaknesses of each in this response from security management expert Mike Rothman. Ask the Expert
-
Is encryption only as good as an organization's password management and access control policies?
Is data encryption helpful if a system's root or admin account is hacked? Learn more about this identity and access managment dilemma. Ask the Expert
-
Should confidential data be indexed or used as the index key?
A recent attack uses a series of insert operations to find weaknesses in the database's indexing algorithm. Michael Cobb explains the nature of the threat and what it means for customer data. Ask the Expert
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
-
Do XPath injection attacks require the same response as SQL injections?
XPath injection attacks are slightly different (and more dangerous) than SQL injections. In this SearchSecurity.com Q&A, application expert Michael Cobb reveals the preventative steps that can protect your systems from either type of assault. Ask the Expert
-
How can I determine whether a database is hosted on a secure platform?
Learn what critical issues need to be addressed when determining if a database is hosted on a secure platform. Ask the Expert
-
How different DBMSes implement Internet database security
Learn what it takes to achieve comprehensive DBMS security, in this application security Ask the Expert Q&A. Ask the Expert
-
How to keep your data and database secure
In this Ask the Expert Q&A, Michael Cobb discusses why having a Web-based application that resides on the same server as the database can be problematic, and, what you can do to keep your data safe. Ask the Expert
-
The pros and cons of application firewalls
In this Ask the Expert Q&A, our application security expert discusses the pros and cons of application firewalls. He also explains how they differ from packet filter and stateful inspection firewalls, and why they are not the preferred among some org... Ask the Expert
-
Authenticating Web applications to SQL
Learn how to securely authenticate Web applications to various databases. Ask the Expert
Security Management Strategies for the CIO