Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Databases

7 RCE and DoS vulnerabilities Found in ClickHouse DBMS

The JFrog Security research team constantly monitors open-source projects to find new vulnerabilities or malicious packages and share them with the wider community to help improve their overall security posture. As part of this effort, the team recently discovered seven new security vulnerabilities in ClickHouse, a widely used open-source Database Management System (DBMS) dedicated to online analytical processing (OLAP).

Enabling compliance for database access

Description: Enterprise databases hold an organization's most sensitive information and need to be protected. Beyond that, organizations must also demonstrate compliance with frameworks like FedRAMP, HIPAA, SOC2, GDPR and more for these databases. Complying with these frameworks without slowing down DBA teams is a challenge. This webinar will demonstrate how to unify access controls for connectivity, authentication, authorization, and audit for popular OSS databases Postgres, MySQL and MongoDB so you can move fast but stay secure.

Database Security in a Zero Trust Architecture

It is no secret that many organizations can do better with their security programs. Zero Trust allows for an evolution of an organization's strategy. It also forces organizations to rethink their approach to securing data to meet the requirements of data privacy regulations and expectations from their customers and business partners. Risk-minded organizations take the Zero Trust mindset and adopt it as best they can to fit their current and future state infrastructure.

11 Steps to Secure SQL in 2022

Whether you’re running Microsoft’s SQL Server (soon to run on Linux) or the open source MySQL, you need to lockdown your databases to keep your data private and secure. These 11 steps will guide you through some of the basic principles of database security and how to implement them. Combined with a hardened web server configuration, a secure database server will keep an application from becoming an entry point into your network and keep your data from ending up dumped on the internet.

Rubrik Enhanced Performance, Usability, and Scale for Microsoft SQL and Oracle Database

Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.

How to To Harden MS SQL Server 2008: 11 Ways

As Redmond's flagship RDBMS solution, SQL Server provides the underlying data platform for a broad range of Microsoft enterprise solutions— from Sharepoint to BizTalk Server. This, of course, makes bolstering SQL Server security a critical necessity for protecting MS-centric infrastructures against attackers. To this end, the following are 11 ways to harden MS SQL Server 2008 security.

10 Principles of Database Security Program Design

Relational databases and big data stores are a prime target for attackers due to the amount of sensitive information residing within, such as customer information, intellectual property and proprietary secrets. For more than 20 years, the database security experts at Trustwave have helped organizations design, implement and maintain database security programs to meet their specific business, security and compliance objectives.

Operationalizing Data Resiliency

Oracle databases are an integral part of modern technological infrastructure for organizations globally. They underpin high-volume digital business, perform thousands of transactions, and house an organization’s critical and sensitive information. Today’s business requirements and data-driven applications are expanding the definition of “data loss” to include data that is inaccessible to the business for a period to significantly and negatively impact it.

How MongoDB built a successful security champions program

We recently spoke with Amy Berman, Security Strategic Operations Lead at MongoDB about the role of security champions at her organization. For those new to the concept, security champions are developers that have an interest in security and can facilitate collaboration between development and security teams.