Stolen Passwords – What happens to your personal information
Password Protection 1 billion. That’s a number that’s hard to ignore, I thought as I read the 2012 KPMG Data Loss Barometer. A billion people have been affected by data loss in the past 5 years....
View ArticleAWS Marketplace Security Offerings
One of the huge advantages of using cloud computing is that your IT operations team is relieved of the need to provide physical and infrastructure security. A second benefit is that you get a built-in...
View ArticleThe Complete Guide for Securing Databases on Amazon RDS
Securing Amazon RDS Amazon Web Services (AWS) is a flexible, scalable and reliable infrastructure-as-a-service provider. AWS provides a suite of infrastructure and complementary monitoring and...
View ArticleSecuring SQL Server on Amazon Web Services EC2 and RDS
By David Maman, CTO of GreenSQL and Lahav Savir, CEO emind Architect & CEO Background Deploying a Microsoft SQL Server database on Amazon’s cloud infrastructure (AWS) may make perfect sense for...
View ArticleWhat you Need to Know about Compliance as a Service
Moving your database to the cloud is becoming not just a viable option for many organizations, but a best practice for availability, flexibility, recovery and even security. Cloud vendors are clear...
View ArticleGet Essential Security Measures to Prevent SQL Injections
SQL injection has been a threat for more than 15 years, so it’s astonishing to recognize that it’s still one of the top data threats to organizations. In a recent report published by *Akamai, there is...
View ArticleSecuring SQL Server – On the Cloud and Off
Moving to the cloud brings its own challenges and perceived perils. So, even if you are still wishy-washy about moving your SQL server to the cloud, you know it’s coming. That’s why most SQL cloud...
View ArticleWhy Static Data Masking is Not Enough
Dynamic vs. Static Data Masking When masking data, organizations prevent unauthorized users from viewing sensitive data and protect information for following regulatory needs. Data masking technology...
View ArticleThe Guide to Dynamic Data Masking
Some of you have probably heard about Dynamic Data Masking, and for those of you who haven’t, well, it’s only a matter of time before you’ll be using it. Companies face new requirements that force them...
View ArticleEasily discover and protect identified sensitive and regulated data
Finding sensitive and regulated data within enterprise databases is one of the key challenges to implementing regulatory compliance, role-based data security, and separation of duties. HexaTier’s...
View Article
More Pages to Explore .....