Blog Posts Tagged with "Databases"

69dafe8b58066478aea48f3d0f384820

Simon Cowell's X Factor Entrant Database Hacked

May 05, 2011 Added by:Headlines

The exposed data includes potential contestant's names, email addresses, contact information, dates of birth, and their gender. Adding to the potential controversy over the breach is the knowledge that a significant number of applicants are as young as 12 years old...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Architecting Secure Information Systems

May 04, 2011 Added by:Robb Reck

Creating secure systems from the ground up requires different skills than buying and bolting on technologies to implement security after the fact. You have the chance to build this new system with a strong foundation. Do not miss your chance to show how security should be addressed...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Is Oracle Misleading Its Database Customers With CPUs?

April 26, 2011 Added by:Alexander Rothacker

Is Oracle misleading its database customers during its quarterly Critical Patch Updates (CPUs)? Unfortunately for its customers, Oracle has figured out a way to downplay the severity of its vulnerabilities and water down the Common Vulnerability Scoring System (CVSS) scoring...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Data Centers Not Prepared for Disaster Recovery

March 31, 2011 Added by:Headlines

“When it comes to disaster recovery, the survey results are indicative of the investment activity we have seen in data centers throughout the recession—focus on immediate needs with business continuity and disaster recovery planning considered a luxury..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Moving Your Data to the Cloud – Sense and Sensibility

March 10, 2011 Added by:Danny Lieberman

Using a cloud service provider for storing sensitive data may actually reduce the threat surface instead of increasing it and give you more control by centralizing and standardizing data storage as part of your overall data governance strategy...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Is Oracle Playing Nice With Java and MySQL?

March 09, 2011 Added by:Bill Gerneglia

Despite a series of snubs toward the Java community, Oracle continues to engage and just recently offered up a new Java Specification Request (JSR) 342, intended to convert Java Enterprise Edition (Java EE) 7 into a building block of cloud services...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Plays Lost and Found With Gmail Accounts

March 02, 2011 Added by:Headlines

What is quite interesting about the event is the revelation from Google that the data for Gmail is backed up on tapes. Yes, Google, which maintains some of the largest network storage systems in the world, backs up data on relatively antiquated tapes...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Database Security Discussion Lacking at RSA Conference

March 01, 2011 Added by:Alexander Rothacker

Why don’t organizations protect the database? It seems incredibly obvious, but it’s clearly not happening as often as it should be. Hopefully next year’s RSA Conference provides more education on database security – after all, that’s where sensitive information spends 99% of its lifecycle...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Proposes Database to Monitor Network Traffic

February 07, 2011 Added by:Headlines

The Department of Defense is considering options to create a computer network monitoring database in an effort to better identify and respond to cyber threats. The main benefit of the shared information database would be to allow the government to respond to cyber threats in a more unified manner...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Deploying N-DEx Advanced Security Search Engine

February 03, 2011 Added by:Headlines

N-DEx is a national information-sharing system available through a secure Internet site for law enforcement and criminal justice agencies. N-DEx allows agencies to search and analyze data using some powerful automated capabilities, helping to connect the dots between people, places, and events...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Another Resolution For 2011: Secure Your Sensitive Data

February 01, 2011 Added by:Alexander Rothacker

Tack on one more resolution for 2011 – secure your sensitive information. Hackers are constantly looking for ways to access critical corporate data and have moved away from the idea of “breaking in because they can” and are looking to harvest sensitive information to sell on the black-market...

Comments  (0)

Fdaa09fc5ed18d3226b3a1a00f1bc48c

Is 2011 the Year of NoSQL Data Breaches?

January 27, 2011 Added by:Daniel Doubrovkine

The buzz about the MongoDB outage at FourSquare got nearly as much attention from the world as the security breaches of traditional RDBMS at Gawker and Silverpop. I believe it’s all going to change soon: TeamSHATTER has seen strong growth in research and hacker activity targeting NoSQL databases...

Comments  (2)

B451da363bb08b9a81ceadbadb5133ef

Oracle’s January 2011 Critical Patch Update

January 24, 2011 Added by:Alexander Rothacker

Starting in 2010, Oracle decreased the number of patches in the database with only 32 fixes reported. The trend continues in the first release of 2011 with only 6 database fixes out of 66 total fixes. The bulk of the other 60 fixes are in Oracle Fusion Middleware, PeopleSoft and Solaris...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Breach May Have Exposed Millions of Client Accounts

January 24, 2011 Added by:Headlines

"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Lessons We Can Learn From the WikiLeaks Debacle

January 13, 2011 Added by:PCI Guru

Requirement 7 of the PCI DSS is all about access to cardholder data and verifying that those users continue to require access. The user management situation with the Net-Centric Diplomacy database is why requirement 7 was put into the PCI DSS...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Vodafone Investigating Database Breach Allegations

January 09, 2011 Added by:Headlines

"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »