September 6, 2017 Resurgent Malware Attack Targets MongoDB 2 min read - Security researchers uncovered a concentrated malware attack against MongoDB servers that is reminiscent of previous attacks from earlier this year.
August 15, 2017 PostgreSQL Database Management System Patches Password Flaws 2 min read - PostgreSQL developers announced a round of patches to address more than 50 bugs and three vulnerabilities in the popular database management system.
Data Protection August 10, 2017 Seeing Data Security Breaches With Your Own Eyes 3 min read - The new Data Insight feature for IBM Security Guardium enables analysts to more effectively monitor database access during security breaches.
June 7, 2017 Database Leak Exposes Millions of Car VINs, Puts Customer Security at Risk 2 min read - The personal information of 10 million U.S. car owners was exposed in a massive leak of car VINs, according to researchers at Kromtech Security.
April 18, 2017 IBM Guardium Takes the Overall Leadership Position in the First Database Security Leadership Compass by KuppingerCole 3 min read - IBM Security Guardium was named the overall leader out of 10 vendors in the "KuppingerCole Leadership Compass for Database Security."
February 28, 2017 Researchers Detect New Attacks Against MySQL Database 2 min read - Analysts found that MySQL databases had been attacked by a ransomware campaign similar to the one that affected MongoDB databases in January.
Data Protection January 25, 2017 Get Serious About Data Protection to Secure MongoDB 4 min read - MongoDB offered a set of security best practices to help users protect their databases from cybercriminals looking to exploit misconfigured servers.
Data Protection September 13, 2016 Is Your Database as Secure as It Should Be? 3 min read - It's important for an organization to leverage reliable data protection solutions to secure a database from both malicious and unintentional threats.
July 26, 2016 Researchers Say SAP HANA and TREX Have Critical Vulnerabilities 2 min read - Onapsis discovered multiple new vulnerabilities affecting the SAP HANA and SAP TREX applications, including critical and high-risk security flaws.
Data Protection July 11, 2016 Worrying About Your White List: Defining Trust in Database Sessions 5 min read - A white list can be tremendously useful when implementing database activity monitoring systems, but there are some considerations to this strategy.