Worrying About Your White List: Defining Trust in Database Sessions

A white list can be tremendously useful when implementing database activity monitoring systems, but there are some considerations to this strategy.

The post Worrying About Your White List: Defining Trust in Database Sessions appeared first on Security Intelligence.

Continue reading Worrying About Your White List: Defining Trust in Database Sessions

Protection Against Cybercriminals Requires Vigilance

Establishing protection against cybercriminals is a tall order for organizations, but it can begin with something as simple as paying attention.

The post Protection Against Cybercriminals Requires Vigilance appeared first on Security Intelligence.

Continue reading Protection Against Cybercriminals Requires Vigilance

Data Governance, Mandates and More, Oh My! DB2 for i Data Security and Compliance Considerations

Data governance is achievable with the help of integrated security tools such as IBM Guardium, which can be applied to databases.

The post Data Governance, Mandates and More, Oh My! DB2 for i Data Security and Compliance Considerations appeared first on Security Intelligence.

Continue reading Data Governance, Mandates and More, Oh My! DB2 for i Data Security and Compliance Considerations