By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Database security News
May 13, 2016
DHS US-CERT warns of a patched SAP Java vulnerability from 2010 that has enabled breaches at three dozen global enterprises due to configuration issues.
October 22, 2015
Oracle patches 154 flaws in its quarterly update. Experts said patches need to be released faster, but Oracle stands by its release schedule.
June 02, 2015
Researchers find that insecure implementation of cloud backups by mobile apps may affect hundreds of thousands of apps and leave as many as 56 million credentials exposed.
March 04, 2015
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.
Database security Get Started
Bring yourself up to speed with our introductory content
The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message. Continue Reading
Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. Continue Reading
Initially, concerns about mobile security were centered around basic controls such as remote wipe. Naturally, though, the focus has shifted to the heart of the mobile enterprise: the app. Mobile app security threats are in their early days, and the ... Continue Reading
Evaluate Database security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Data obfuscation techniques can help enterprises protect corporate information and limit risks of data exposure or leaks. Expert Ajay Kumar explains how these techniques work. Continue Reading
Open source NoSQL MongoDB database faced 30,000 insecure instances. Expert Michael Cobb explains the misconfiguration that led to this, and how to prevent it with other programs. Continue Reading
Learn how to evaluate and buy the right database security tools for your organization with this database security tool buyer's guide. Continue Reading
Manage Database security
Learn to apply best practices and optimize your operations.
Better mobile app security in the enterprise starts with a few steps -- protect data confidentiality, integrity and access. Continue Reading
Expert Michael Cobb discusses how to identify the data egress points in enterprise databases to prevent malicious data exfiltration. Continue Reading
Expert Mike Chapple details the necessary database security controls that an organization must implement to achieve a PCI-compliant database. Continue Reading
Problem Solve Database security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and ... Continue Reading
With another round of patches for several serious Java flaws, Oracle's quarterly CPU showed that Java security problems are not receding. Continue Reading
Expert Nick Lewis explains how the Narilam malware infects SQL databases and destroys corporate records, and offers advice on mitigation. Continue Reading