www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

Submitted URL: https://www.darkreading.com/database-security//
Effective URL: https://www.darkreading.com/database-security
Submission: On December 22 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext



DATABASE SECURITY


Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics
Decisions in the UK and Australia, and lawsuits in the United States, could
force facial-recognition providers to remove data from their machine-learning
models.
November 30, 2021
Decisions in the UK and Australia, and lawsuits in the United States, could
force facial-recognition providers to remove data from their machine-learning
models.

by Robert Lemos, Contributing Writer
November 30, 2021
6 min read

Vulnerabilities/Threats


Article
Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data
pipeline as source data is migrated to Redshift and used for data analytics.
November 23, 2021
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data
pipeline as source data is migrated to Redshift and used for data analytics.

by Dark Reading Staff, Dark Reading
November 23, 2021
3 min read

DR Tech


Article

Emerging Security Tools Tackle GraphQL Security
New security tools are proactively protecting APIs built with GraphQL, before
attacks against them become more commonplace.
November 12, 2021
New security tools are proactively protecting APIs built with GraphQL, before
attacks against them become more commonplace.

by Fahmida Y. Rashid, Features Editor, Dark Reading
November 12, 2021
4 min read

DR Tech


Article
Researcher Details Vulnerabilities Found in AWS API Gateway
AWS fixed the security flaws that left the API service at risk of so-called HTTP
header-smuggling attacks, says the researcher who discovered them.
November 10, 2021
AWS fixed the security flaws that left the API service at risk of so-called HTTP
header-smuggling attacks, says the researcher who discovered them.

by Kelly Jackson Higgins, Executive Editor
November 10, 2021
3 min read

Vulnerabilities/Threats


Article
HelpSystems Acquires Digital Guardian, Extends DLP Capabilities
The acquisition strengthens HelpSystems’ data security portfolio with data loss
prevention capabilities across the endpoint, network, and cloud.
October 27, 2021
The acquisition strengthens HelpSystems’ data security portfolio with data loss
prevention capabilities across the endpoint, network, and cloud.

by Dark Reading Staff, Dark Reading
October 27, 2021
2 min read

Cloud


Article
Free Tool Helps Security Teams Measure Their API Attack Surface
Data Theorem's free API Attack Surface Calculator helps security teams
understand potential API exposures.
October 26, 2021
Data Theorem's free API Attack Surface Calculator helps security teams
understand potential API exposures.

by Dark Reading Staff, Dark Reading
October 26, 2021
2 min read

DR Tech


Article
Damages Escalate Rapidly in Multiparty Data Breaches
Analysis of the top-50 multiparty attacks over the past decade finds that
nation-state-linked hackers focused on disruption and using stolen credentials
cause the most damage.
October 19, 2021
Analysis of the top-50 multiparty attacks over the past decade finds that
nation-state-linked hackers focused on disruption and using stolen credentials
cause the most damage.

by Robert Lemos, Contributing Writer
October 19, 2021
4 min read

Attacks/Breaches


Article
How Security Teams Can Reinforce End-User Awareness
Training programs provide the information, but security teams can reinforce
these for better end-user education.
October 14, 2021
Training programs provide the information, but security teams can reinforce
these for better end-user education.

by Karen Walsh, Privacy & Compliance Expert
October 14, 2021
4 min read

Risk


Article
Nearly 50% of On-Premises Databases Have Vulnerabilities
A network compromise shouldn't mean "game over" for corporate data, but survey
data shows many companies fail to protect their crown jewels.
September 14, 2021
A network compromise shouldn't mean "game over" for corporate data, but survey
data shows many companies fail to protect their crown jewels.

by Robert Lemos, Contributing Writer
September 14, 2021
4 min read

Database Security


Article
4 Steps for Fostering Collaboration Between IT Network and Security Teams
Successful collaboration requires a four-pronged approach that considers
operations and infrastructure, leverages shared data, supports new workflows,
and is formalized with documentation.
September 13, 2021
Successful collaboration requires a four-pronged approach that considers
operations and infrastructure, leverages shared data, supports new workflows,
and is formalized with documentation.

by Tom Bienkowski, Director, Product Marketing, NETSCOUT
September 13, 2021
5 min read

Operations


Article
Researchers Play Leading Role in Detecting Cloud Misconfiguration
A new report finds 62% of cloud misconfiguration incidents are reported by
independent researchers before criminals can find them.
September 09, 2021
A new report finds 62% of cloud misconfiguration incidents are reported by
independent researchers before criminals can find them.

by Kelly Sheridan, Senior Editor
September 09, 2021
4 min read

Cloud


Article
'ProxyToken' Flaw Heightens Concerns Over Security of Microsoft Exchange Server
New flaw is one among several that have been disclosed in the software over the
past several months.
September 02, 2021
New flaw is one among several that have been disclosed in the software over the
past several months.

by Jai Vijayan, Contributing Writer
September 02, 2021
5 min read

Vulnerabilities/Threats


Article
Microsoft Azure Cosmos DB Incident Underscores the Need to Closely Watch Cloud
Data
Even businesses that do everything right still need to monitor their data and
cloud services.
August 30, 2021
Even businesses that do everything right still need to monitor their data and
cloud services.

by Robert Lemos, Contributing Writer
August 30, 2021
4 min read

Cloud


Article
Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases
Researchers discovered that a data-science feature on Azure allowed anyone to
retrieve the credentials of other companies using that feature, potentially
exposing billions of records.
August 27, 2021
Researchers discovered that a data-science feature on Azure allowed anyone to
retrieve the credentials of other companies using that feature, potentially
exposing billions of records.

by Robert Lemos, Contributing Writer
August 27, 2021
4 min read

Cloud


Article
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Attacks require executing code on a system but foil Apple's approach to
protecting private data and systems files.
August 05, 2021
Attacks require executing code on a system but foil Apple's approach to
protecting private data and systems files.

by Robert Lemos, Contributing Writer
August 05, 2021
4 min read

Application Security


Article


DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept