Email Alerts
-
Understanding transparent data encryption in SQL Server 2008
Transparent data encryption can go a long way toward meeting compliance and security standards. Learn what TDE can do for you, with details on the considerations that should be made before it's implemented. Tip
-
The ins and outs of database encryption
While pundits and gurus may say the "easy" data protection option is for an enterprise to encrypt its entire database, the truth is it's much harder than many realize. In this tip, database security expert Rich Mogull examines the two primary use cas... Tip
-
Look before leaping into database encryption
Encryption is the ultimate mechanism for data protection, but the process of developing an encryption strategy can be daunting. In this tip, contributor James C. Foster explains the database encryption options available and offers guidance for ensuri... Tip
-
Data leakage detection and prevention
While corporate data loss is not a new concern, newer technologies are emerging to help combat the threat. In this tip, Joel Dubin advises how to reduce data leaks, reviews products that can identify network vulnerabilities and keep mobile device dat... Tip
-
Database compliance demystified
As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, James C. Foster looks at specific regulations such as SO... Tip
-
Leveraging database security investments
Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m... Tip
-
How simple steps ensure database security
An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate the... Tip
-
Laptop security essentials: Protecting device data, even from admins?
In this ITKnowledge Exchange thread, information security pros explain how to prevent unauthorized access, but question whether measures should be put in place to protect data from admins. Tip
-
Secure data transmission methods
The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. Tip
-
Defense tactics for SQL injection attacks
Learn why fixing front-end Web code and appropriately configuring backend databases provides the best defense against SQL injection attacks. Tip
Security Management Strategies for the CIO