Database security
Get the latest database security news, tips and information for Oracle, IBM DB2, and Microsoft's SQL Server and more. Learn about database security gateways, database encryption and the simple steps that can eradicate database vulnerabilities.
New & Notable
Database security News
-
August 25, 2020
25
Aug'20
'Meow' attacks top 25,000 exposed databases, services
One month after the notorious 'meow' attacks were first detected, the threat to misconfigured databases exposed on the internet shows little sign of slowing down.
-
July 30, 2020
30
Jul'20
'Meow' attacks continue, thousands of databases deleted
More than one week later, the mysterious attacks on insecure databases on ElasticSearch, MongoDB and others have not only persisted but grown, with no explanation.
-
July 23, 2020
23
Jul'20
'Meow' attacks wipe more than 1,000 exposed databases
A new threat has hit more than 1,000 unsecured databases on ElasticSearch, MongoDB and other platforms, destroying data and replacing files with a single word: meow.
-
May 07, 2020
07
May'20
Advanced Computer Software leak exposes nearly 200 law firms
Researchers at cybersecurity vendor TurgenSec discovered an exposed database owned by Advanced Computer Software that contained legal documents with data from 190 law firms.
Database security Get Started
Bring yourself up to speed with our introductory content
-
Application, database and data security quiz
Are you up to speed with database and application security know-how? Test your comprehension of best practices, emerging threats and more with this data security quiz. Continue Reading
-
What are the top secure data transmission methods?
Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Continue Reading
-
Database protection methods expand to shield data from attackers
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data. Continue Reading
Evaluate Database security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Analyzing the top 2019 data breach disclosures: Hindsight in 2020
Make 2020 the year your company keep its resolution to avoid a data breach. Experts offer lessons learned from the top 2019 data breaches to help stay secure in the year ahead. Continue Reading
-
The developer's role in application security strategy
Developers often pay lip service about being integral to application security, but they usually don't consider vulnerabilities until much too late in the dev process. Continue Reading
-
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
TLBleed exploits Intel's HTT feature to leak data via side-channel attacks. Learn about how TLBleed obtains sensitive memory information from expert Michael Cobb. Continue Reading
Manage Database security
Learn to apply best practices and optimize your operations.
-
4 enterprise database security best practices
Beyond protecting enterprise databases from vulnerabilities, it is critical to improve and review their security on a regular basis. Learn more with these database security best practices. Continue Reading
-
How paradigms shifting can alter the goals of attackers and defenders
The use of disruptive technology is altering the way attackers and defenders set goals for network security. Learn more about the shifting field with Matt Pascucci. Continue Reading
-
How testing perspectives helps find application security flaws
Application security testing requires users to test from all the right perspectives. Discover testing techniques that help find application security flaws with expert Kevin Beaver. Continue Reading
Problem Solve Database security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Rising database security threats require attention -- and action
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds. Continue Reading
-
Protecting data on the go
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and ... Continue Reading
-
Three steps to better mobile app security
Better mobile app security in the enterprise starts with a few steps -- protect data confidentiality, integrity and access. Continue Reading