EnclaveDB, The Proposition

via Christian Priebe of Imperial College London, Manuel Costa and Kapil Vaswani both from Microsoft Research, comes a tour dé force of database security, ostensibly monikered EnclaveDB (published this past May 2018, in the Proceedings of the 39t… Continue reading EnclaveDB, The Proposition

Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration

Security analysts can maximize the effectiveness of their incident response capabilities by integrating disparate tools such as database firewalls and UBA with a strong SIEM solution.

The post Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration appeared first on Security Intelligence.

Continue reading Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration

How to Tune Your Database Security to Protect Big Data

Data security for big data faces the same threats of external breaches, malicious insiders, and compromised insiders. So how do we take the trusted, successful data security methods used on RDBMS, and render them compatible with big data servers? How c… Continue reading How to Tune Your Database Security to Protect Big Data

SQL Security Chronicles

Quite likely, the single most significant data security educational series of blog posts this year – via the Imperva Cyber Security Blog,written by Elad Erez and Luda Lazar – now in Part 3 of the series (Part 1 and Part 2 are highly recommended as wel… Continue reading SQL Security Chronicles

RDaaS Security: How to Apply Database Audit and Monitoring Controls

As you move data to the cloud, data security and compliance requirements move along with it. This article explains how you can apply database audit and monitoring controls when migrating your database to cloud services.
The post RDaaS Security: How to … Continue reading RDaaS Security: How to Apply Database Audit and Monitoring Controls

Securing Healthcare Data and Applications

The healthcare industry is quickly growing as a sweet spot for hackers to steal large amounts of patient records for profit. The US Department of Health and Human Services breach tool reports over 340 data breaches in 2017 impacting more than 3 million… Continue reading Securing Healthcare Data and Applications

What, Me Worry? Car Data, Where Does It Go…

Where does all of that data gathered by car manfacturers while we drive? Perhaps Jonathan M. Gitlin, reporting for everyone’s beloved Ars Technica can fulfill that data request in a speedy manner! Shouldn’t the driver/owner of the vehicle make that de… Continue reading What, Me Worry? Car Data, Where Does It Go…

NEW: Vulnerability and Assessment Scanning for Your AWS Cloud Databases

Scuba is a free and easy-to-use tool that uncovers hidden security risks. With Scuba you can: scan enterprise databases for vulnerabilities and misconfigurations, identify risks to your databases and get recommendations on how to mitigate identified is… Continue reading NEW: Vulnerability and Assessment Scanning for Your AWS Cloud Databases

NEW: Vulnerability and Assessment Scanning for Your AWS Cloud Databases

Scuba is a free and easy-to-use tool that uncovers hidden security risks. With Scuba you can: scan enterprise databases for vulnerabilities and misconfigurations, identify risks to your databases and get recommendations on how to mitigate identified is… Continue reading NEW: Vulnerability and Assessment Scanning for Your AWS Cloud Databases

Where Is Your Sensitive Information and Where Is It Going?

To protect sensitive information, security professionals must know exactly where this data resides, who is accessing it, when it is being accessed and whether this activity violates policy.

The post Where Is Your Sensitive Information and Where Is It Going? appeared first on Security Intelligence.

Continue reading Where Is Your Sensitive Information and Where Is It Going?