Geek-Guy.com

Tag: database security

How the Evolution of Agents has Been Essential for Modern Database Security

In today’s data driven world, every organization’s most important asset is their data. Accordingly and similarly to other protected components like applications, web and peripheral gateways, databases require a dedicated security solution as well. An essential database security solution must provide fundamental features such as: reporting, asset discovery, vulnerability management, and most importantly, database auditing […]

The post How the Evolution of Agents has Been Essential for Modern Database Security appeared first on Blog.

Omnichannel E-commerce Growth Increases API Security Risk

Today, a lot of the digital innovation we see is largely thanks to the application programming interface (API). Without APIs, rapid development would be nearly impossible. After all, the API is the link between computers, software and computer programs. But wherever there’s a link, a potential data security weakness exists. Essential for modern mobile, SaaS […]

The post Omnichannel E-commerce Growth Increases API Security Risk appeared first on Security Intelligence.

Relay races, batons, and techniques: How to improve your cloud security posture

In 2008, the US 4x100m relay team was the favorite to win the gold medal at the Beijing Olympics. Not a massive surprise, considering that team included the second fastest athlete in history, Tyson Gay. It was a great shock though when the team blundered on the last exchange, dropping the baton, and failing to […]

The post Relay races, batons, and techniques: How to improve your cloud security posture appeared first on Blog.

How to Cut Down on Data Breach Stress and Fatigue

If you’re tired of hearing the words ‘data breach’, you’re not alone. It’s looking like 2021 might end up becoming the year with the most ransomware attacks on record. In August, SonicWall reported that the global ransomware attack volume had increased 151% during the first six months of the year compared to H1 2020. The […]

The post How to Cut Down on Data Breach Stress and Fatigue appeared first on Security Intelligence.

Top Cybersecurity Threats Around the Globe

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives.  Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch […]

The post Top Cybersecurity Threats Around the Globe appeared first on Security Intelligence.

Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape

For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams have tried to funnel every application into using those databases. Today, as the pressure to innovate while keeping costs low intensifies, organizations have started moving many workloads to the cloud. According to Gartner, by 2022 […]

The post Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape appeared first on Blog.

A security architect’s POV on a mature data-centric security program, Part 3

In part one of this series, you learned about the challenges associated with accessing, and searching long-term retained database activity logs and identifying sensitive customer data to comply with stricter compliance regulations. In part two, you gained insight into how security professionals can mitigate database security risks when executive leadership orders the organization to migrate […]

The post A security architect’s POV on a mature data-centric security program, Part 3 appeared first on Blog.

How to Exploit SQL Server Using Registry Keys

At the Imperva Research Labs we have the chance to scrutinize various security situations. In this blog, we will take a closer look at database security on SQL Server. One routine approach that security practitioners employ to protect databases is deploying honeypots and waiting for bad actors to take the bait. This approach is very […]

The post How to Exploit SQL Server Using Registry Keys appeared first on Blog.

How to Exploit SQL Server Using OLE Automation

As part of the Imperva Research Labs we have the opportunity to examine various security scenarios. In this post, we will consider database security on SQL Server. One standard method that security practitioners use to protect databases is deploying honeypots and waiting for hackers to take the bait. Honeypots are very useful because they enable […]

The post How to Exploit SQL Server Using OLE Automation appeared first on Blog.