Despite hefty Oracle CPU, expert fears unpatched DB flaws

Database Security Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Understanding transparent data encryption in SQL Server 2008

    Transparent data encryption can go a long way toward meeting compliance and security standards. Learn what TDE can do for you, with details on the considerations that should be made before it's implemented. 

  • The ins and outs of database encryption

    While pundits and gurus may say the "easy" data protection option is for an enterprise to encrypt its entire database, the truth is it's much harder than many realize. In this tip, database security expert Rich Mogull examines the two primary use cas... 

  • Look before leaping into database encryption

    Encryption is the ultimate mechanism for data protection, but the process of developing an encryption strategy can be daunting. In this tip, contributor James C. Foster explains the database encryption options available and offers guidance for ensuri... 

  • Data leakage detection and prevention

    While corporate data loss is not a new concern, newer technologies are emerging to help combat the threat. In this tip, Joel Dubin advises how to reduce data leaks, reviews products that can identify network vulnerabilities and keep mobile device dat... 

  • Database compliance demystified

    As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, James C. Foster looks at specific regulations such as SO... 

  • Leveraging database security investments

    Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m... 

  • How simple steps ensure database security

    An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate the... 

  • Laptop security essentials: Protecting device data, even from admins?

    In this ITKnowledge Exchange thread, information security pros explain how to prevent unauthorized access, but question whether measures should be put in place to protect data from admins. 

  • Secure data transmission methods

    The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. 

  • Defense tactics for SQL injection attacks

    Learn why fixing front-end Web code and appropriately configuring backend databases provides the best defense against SQL injection attacks.