www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
Submitted URL: https://www.darkreading.com/database-security//
Effective URL: https://www.darkreading.com/database-security
Submission: On December 22 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/database-security
Submission: On December 22 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 * Cloud Security Strategies for Today's Enterprises Jan 06, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 * Cloud Security Strategies for Today's Enterprises Jan 06, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 * Cloud Security Strategies for Today's Enterprises Jan 06, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. Event Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event | December 8, 2021 <REGISTER NOW> Alert Check out our NEW section called "DR Tech" for comprehensive coverage of new & emerging cybersecurity technology. PreviousNext DATABASE SECURITY Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models. November 30, 2021 Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models. by Robert Lemos, Contributing Writer November 30, 2021 6 min read Vulnerabilities/Threats Article Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics. November 23, 2021 Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics. by Dark Reading Staff, Dark Reading November 23, 2021 3 min read DR Tech Article Emerging Security Tools Tackle GraphQL Security New security tools are proactively protecting APIs built with GraphQL, before attacks against them become more commonplace. November 12, 2021 New security tools are proactively protecting APIs built with GraphQL, before attacks against them become more commonplace. by Fahmida Y. Rashid, Features Editor, Dark Reading November 12, 2021 4 min read DR Tech Article Researcher Details Vulnerabilities Found in AWS API Gateway AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them. November 10, 2021 AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them. by Kelly Jackson Higgins, Executive Editor November 10, 2021 3 min read Vulnerabilities/Threats Article HelpSystems Acquires Digital Guardian, Extends DLP Capabilities The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud. October 27, 2021 The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud. by Dark Reading Staff, Dark Reading October 27, 2021 2 min read Cloud Article Free Tool Helps Security Teams Measure Their API Attack Surface Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures. October 26, 2021 Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures. by Dark Reading Staff, Dark Reading October 26, 2021 2 min read DR Tech Article Damages Escalate Rapidly in Multiparty Data Breaches Analysis of the top-50 multiparty attacks over the past decade finds that nation-state-linked hackers focused on disruption and using stolen credentials cause the most damage. October 19, 2021 Analysis of the top-50 multiparty attacks over the past decade finds that nation-state-linked hackers focused on disruption and using stolen credentials cause the most damage. by Robert Lemos, Contributing Writer October 19, 2021 4 min read Attacks/Breaches Article How Security Teams Can Reinforce End-User Awareness Training programs provide the information, but security teams can reinforce these for better end-user education. October 14, 2021 Training programs provide the information, but security teams can reinforce these for better end-user education. by Karen Walsh, Privacy & Compliance Expert October 14, 2021 4 min read Risk Article Nearly 50% of On-Premises Databases Have Vulnerabilities A network compromise shouldn't mean "game over" for corporate data, but survey data shows many companies fail to protect their crown jewels. September 14, 2021 A network compromise shouldn't mean "game over" for corporate data, but survey data shows many companies fail to protect their crown jewels. by Robert Lemos, Contributing Writer September 14, 2021 4 min read Database Security Article 4 Steps for Fostering Collaboration Between IT Network and Security Teams Successful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared data, supports new workflows, and is formalized with documentation. September 13, 2021 Successful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared data, supports new workflows, and is formalized with documentation. by Tom Bienkowski, Director, Product Marketing, NETSCOUT September 13, 2021 5 min read Operations Article Researchers Play Leading Role in Detecting Cloud Misconfiguration A new report finds 62% of cloud misconfiguration incidents are reported by independent researchers before criminals can find them. September 09, 2021 A new report finds 62% of cloud misconfiguration incidents are reported by independent researchers before criminals can find them. by Kelly Sheridan, Senior Editor September 09, 2021 4 min read Cloud Article 'ProxyToken' Flaw Heightens Concerns Over Security of Microsoft Exchange Server New flaw is one among several that have been disclosed in the software over the past several months. September 02, 2021 New flaw is one among several that have been disclosed in the software over the past several months. by Jai Vijayan, Contributing Writer September 02, 2021 5 min read Vulnerabilities/Threats Article Microsoft Azure Cosmos DB Incident Underscores the Need to Closely Watch Cloud Data Even businesses that do everything right still need to monitor their data and cloud services. August 30, 2021 Even businesses that do everything right still need to monitor their data and cloud services. by Robert Lemos, Contributing Writer August 30, 2021 4 min read Cloud Article Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases Researchers discovered that a data-science feature on Azure allowed anyone to retrieve the credentials of other companies using that feature, potentially exposing billions of records. August 27, 2021 Researchers discovered that a data-science feature on Azure allowed anyone to retrieve the credentials of other companies using that feature, potentially exposing billions of records. by Robert Lemos, Contributing Writer August 27, 2021 4 min read Cloud Article Researchers Find Significant Vulnerabilities in macOS Privacy Protections Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files. August 05, 2021 Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files. by Robert Lemos, Contributing Writer August 05, 2021 4 min read Application Security Article DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2021 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept