database security
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Mistakes that led to the massive Utah data breach
A little over a month ago, the largest data breach in Utah history resulted in the compromise of Social Security numbers of some 280,000 Medicaid and Children’s Health …
Simplexo SDK enhances database security
A new Software Developers Kit (SDK), designed to keep all information stored in corporate databases secure, has been launched by Simplexo. Simplexo Data-Secure SDK has been …
Sophos finds unauthorized RATs on server, takes partner portal offline
Renowned security firm Sophos has taken down one of its partner portals (located at ) following the discovery of a compromise of the server on which it’s hosted. …
MySQL Troubleshooting
Stuck with bugs, performance problems, crashes, data corruption, and puzzling output? If you’re a database programmer or DBA, they’re part of your life. The trick …
SQL injection main database security concern among SMBs
GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
Real-time session monitoring by Cyber-Ark
Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …
Security for MySQL and Teradata databases
McAfee announced its new McAfee Database Activity Monitoring solution offering reliable, real-time protection for business-critical databases. The solution enables …
Eliminating malware resident on file shares
FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of …
Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Greatest risks to database security
The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments