Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Databases

NoSQL-based stacks exposed to the Internet

NoSQL technology has become more popular in recent years thanks to the development of new open-source NoSQL databases that are relatively easy to install, use and integrate with web frameworks. An example of one of those popular frameworks on the internet is known as MEAN (MongoDb, Express.js, Angular.js, Node.js). These NoSQL frameworks have become very popular for things such as content management, catalogs and big data in general.

The Changing Face of Database Security

To examine the changes in how organizations are approaching database security, we interviewed Thomas Patterson, Senior Product Manager for database security services at Trustwave. Topics of discussion included challenges that businesses are facing in securing data, how they’re changing their approach to meet those challenges, and what tools are available to help. Find more topics at the Trustwave blog.

What is SQL Injection Attack? What are its Types?

SQL injection is a popular method amongst hackers that can cause major problems within an organization. Through SQL injection, an attacker can easily bypass various security measures like authentication. In this article, we will take a closer look at how you can prevent it. What is SQL injection attack? Even though they have been around for a while, SQL injections still pose a serious danger to web applications.

What is Database Security?

Database security refers to the various measures organizations take to ensure their databases are protected from internal and external threats. Database security includes protecting the database itself, the data it contains, its database management system, and the various applications that access it. Organizations must secure databases from deliberate attacks such as cyber security threats, as well as the misuse of data and databases from those who can access them.