Database Security Tools and Techniques

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads. 

  • Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... 

  • Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... 

  • PING with Suzanne Hall

    In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. 

  • Implementing Database Security and Auditing: Trojans

    An excerpt from Chapter 9 of "Implementing Database Security and Auditing," by Ron Ben Natan. 

  • RSA Conference 2006

    Can't make it to RSA 2006? Check out our continuous coverage from the show floor. 

  • Serious Organized Crime Agency (SOCA)

    The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration. SOCA is based in the United Kingdom. (Continued...) 

  • Cryptography for the rest of us

    In this video, learn cryptography techniques for your enterprise that comply with regulatory and legal requirements, as well as what you need to understand before buying or building cryptography solutions. 

  • New SQL injection attacks and defense

    Lenny Zeltser, security consulting leader at Savvis Inc., explains how some are using SQL injection to actually embed new content, particularly HTML code. 

  • Database security best practices: Video with David Litchfield

    David Litchfield, managing director at NGSSoftware Ltd., reviews three of the most common mistakes that database administrators are making. 

  • Inside a retail hack

    Kevin Mandia of security consultancy Mandiant Corp. reviews an attack that is commonly used to swipe PIN numbers and compromise retailers: SQL injection. 

About Database Security Tools and Techniques

Get useful tips and tricks on database security and protection. Discover how several database security methods, tools and techniques, such as database encryption, application firewalls and data security software can help security pros protect sensitive data.