Database Security Essentials: 10 Tips for Keeping Your Data Safe

[et_pb_section fb_built=”1″ _builder_version=”4.16″ custom_padding=”0px|||||”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.24.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”|0px||||” global_colors_info=”{}”] In a world where data breaches are becoming more common, safeguarding your database has never been more critical. With the constant threat of unauthorized access, malicious activity, and insider threats, it’s essential to implement robust […]

Streamlining IT Support in NJ: Tips for Efficient and Effective Database Services

If you’re a small to midsized business (SMB) looking for comprehensive third-party IT support in NJ, you might have noticed a problem: many managed service providers (MSPs) do not specifically offer database administration (DBA) services. The care and feeding of databases is business-critical and takes special skills. Yet MSPs tend to lump DBA services in […]

SQL Server Consulting Services: Maximizing Your Database Performance and Security

As your company becomes increasingly data-driven and you initiate more database projects, your Microsoft SQL Server environment inevitably increases in size and complexity—and so does the trouble a faltering, crashed or insecure database can potentially cause.  Degraded performance, malfunctioning SQL processes, corrupted data sets, and other SQL Server challenges demand immediate, expert attention. Having a […]

Securing Your Database: The Importance of SQL Server Audit to Safeguard CUI

Businesses that handle Controlled Unclassified Information (CUI) or other sensitive data need to comply with applicable information security and privacy regulations to minimize the risk of a data breach, data loss, and other threats to data confidentiality, integrity, and availability. This generally includes regularly or continuously monitoring and auditing all the activities taking place in […]

Oracle SQL Firewall: A New Feature That Blocks Top Database Attacks in Real-Time

Oracle 23c introduces a very powerful and easy-to-use database security feature that many users will want to try, especially for web application workloads. Called Oracle SQL Firewall, it offers real-time protection from within the database kernel against both external and insider SQL injection attacks, credential attacks, and other top threats.  Oracle SQL Firewall should be […]

The Ultimate Oracle Database Security Assessment Checklist for 2023

They are two simple words, but they are two of the most feared words in business: Data Breach! When companies lose their data, they also lose stakeholder trust and the ability to conduct “business as usual.” One common security gap is that many companies focus on network security while falling short on database security. Your network […]

When You Should Use TDE vs Always Encrypted

Microsoft SQL Server and Microsoft Azure SQL Database offer two complementary encryption options: Transparent Data Encryption (TDE) and Always Encrypted. This blog post will help you decide when to use TDE versus Always Encrypted, and when to combine them for a “defense in depth” security and compliance strategy. When to use Transparent Data Encryption Transparent […]

Oracle Database Assessment: Here’s What to Focus On

Organizations need to keep a close watch on Oracle operations to ensure agreed service levels are always being met. Database downtime can quickly lead to financial and reputational impacts, making periodic Oracle database assessments integral to the smooth operation of your most critical business systems—and thus your company itself.   Also called Oracle database health checks, […]

How CIS benchmarks plug Cybersecurity Framework Gaps

While a good Cybersecurity Framework specifies the implementation of controls to mitigate information-related risk for the full life cycle of critical data, in practice I have observed that in many organizations the framework implementation tends to focus on the networks, the servers, and the applications. The lack of database focus exposes the mission-critical data of […]

5 Database Security Risks You Probably Don’t Know You Have

I recently appeared on an episode of The Virtual CISO Podcast hosted by my friend John Verry titled “Confronting the Wild West of Database Security.” In our conversation, I emphasized that despite the criticality of the data involved, many companies fail to appreciate the cybersecurity risks associated with their databases. They simply don’t realize how […]

Skip to content