Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

As machine learning (ML) becomes the norm of the data industry, it's clear that its potential is limited within current data structures. Tabular data strategies have decreased in efficiency, as they lack the ability to acknowledge relationships interconnecting various data points. Data models create complexities as they become scaled by data scientists, constructed by different code languages for different data pipelines, yielding low productivity and high development times. Leaders in ML and data consumption look towards improving data science strategies to widely increase data value and data model efficiency.

Posted August 17, 2022

Arcion, a provider of a cloud-native, CDC-based data replication platform, is launching its latest product release to further extend their platform's capability to cater towards ease of use and increased performance for data migration and access. The launch continues to address the issue of data trapped in transactional data silos, like Oracle, as well as migration of that data into a variety of cloud data warehouses. The product's release comes after four years of development, adding dramatic depth to their products that help differentiate their service from anyone else on the market, according to the vendor.

Posted August 17, 2022

Cloudera, a hybrid data organization, is debuting its Cloudera Data Platform (CDP) One, an all-in-one data lakehouse SaaS, promising accelerated and accessible self-service analytics and exploratory data science on any data type. According to the company, CDP One delivers enterprise security and machine learning (ML) without requiring staff, resulting in lower TCO and reduced risk. CDP One is for customers who desire a low-code, self-service solution in conjunction with CDP One, which was not previously offered.

Posted August 17, 2022

Hewlett Packard Enterprise company, Zerto, is announcing its integration with Amazon Web Services (AWS) ISV Workload Migration Partner Program, offering AWS workload migration drive and delivery, as well as expedited adoption of its cloud data management and protection solutions. As a platform, Zerto aims to eliminate risk in cloud data management and protection while adapting to the modernization of cloud adoption across private, public, and hybrid deployments.

Posted August 15, 2022

IGEL, provider of the managed endpoint operating system for secure access to any digital workspace, announced it has created the IGEL Disaster Recovery Program, enabling organizations to quickly regain control of malware affected devices to mitigate the impact of an attack, including ransomware, and quickly restore end-user productivity.

Posted August 11, 2022

Thanks to significant innovation and recent disruption in the data management space, organizations are achieving unprecedented value from both internal and external data. Much emphasis has been placed on the importance of achieving digital transformation, yet thanks to these rich data assets, organizations are finding new ways to serve customers across both digital and physical boundaries.

Posted August 11, 2022

The data lakehouse, data fabric, and data mesh, are no longer just dreams shared by analysts at conference presentations. A new survey of more than 200 IT leaders by Unisphere Research, a division of Information Today, Inc., finds considerable uptake of these modern data architectures. "The Move to Modern Data Architecture: 2022 Data Delivery and Consumption Patterns Survey," May 2022, was conducted in partnership with ChaosSearch and included input from directors/managers of IT, directors/managers of analytics, and data architects.

Posted August 11, 2022

Working with databases causes friction. On one side, nontechnical managers want data pros to skip the jargon and clearly describe their needs. On the other side, data pros wish their managers had a deeper understanding of the tech involved. Nontechnical managers may think they need to understand the technology better and get into the weeds to close this inherent trust gap. But this isn't the case—managers are busy tracking resource allocations, Gantt charts, project plans, and punch lists. They must also fill open slots, upskill employees, and keep people from falling prey to the Great Resignation.

Posted August 11, 2022

The challenge with modern supply chains is one of multiple pressures hitting all at once. These include pandemic-induced disruptions, cyber attacks targeting supply chains and the effect that financial and trade sanctions are having on Russia for its war in Ukraine. To be more resilient, many companies have opened the spigot on enterprise investment and technology innovation for supply chain modernization. But these efforts must be well-coordinated to be effective. 

Posted August 11, 2022

These days, data managers have an embarrassment of riches when it comes to the platforming, storage, and provisioning of data and associated analytics applications. However, selecting the right environment for pressing business needs can be confusing and overwhelming. The key is understanding how to map the right technologies to the business problems or opportunities at hand.

Posted August 11, 2022

Assuring data quality should be one of the most important goals for IT professionals. This is truer today than it has ever been as organizations rely on data to power their AI and machine learning algorithms. Accurate, quality data is required if you want to make accurate decisions. And that is true, whether the data is being analyzed by a human or a computer algorithm.

Posted August 11, 2022

Accelerated digital transformation has been felt in a variety of ways across all industry sectors for the past 2 years. Digital infrastructure resiliency and agility are crucial in periods of uncertainty and disruption, which many organizations are experiencing with the confluence of disrupted supply chains, rising inflation, geopolitical instability, energy price spikes, the ongoing global pandemic, and climate change.

Posted August 10, 2022

NetSPI, an enterprise penetration testing and attack surface management company, is releasing two new open-source tools for identity and access management (IAM) and security operations center (SOC) groups. These tools, PowerHuntShares and PowerHunt, will aid information security teams discover vulnerable network shares and improve detections overall.

Posted August 09, 2022

Kyligence, an open source Online Analytical Processing platform (OLAP) for big data, is announcing its completion of System and Organization Controls (SOC) 2 Type II certification, meaning it now adheres to the American Institute of Certified Public Accountants (AICPA).This is preceded by their completion of SOC Type I in 2021, assuring Kyligence's continued compliance through third-party auditing office, Ernst & Young.

Posted August 09, 2022

Canonic Security is launching AppTotal API, providing security teams the means for Canonic App Access & Vulnerability automation and integration within their workflows, pre-existing app vetting, and governance systems. AppTotal, an independent index of SaaS add-ons and integrations, is being configured with this API layer to improve automation without the risk of security breaches for app-to-IT-system connectivity. 

Posted August 08, 2022

More than ever, people are concerned for their data privacy. This modern problem has ramifications for industries regarding data management, generating an important question: how do you responsibly leverage data in a world concerned about data privacy and safety? As risk and concern continues to increase surrounding data management, innovations towards legal and ethical management tools and standards intend to make way for establishing trust between company and data subjects.

Posted August 08, 2022

With IBM z16, application developers can preserve the future integrity of critical documents by implementing dual-signing schemes using the lattice-based cryptographic algorithm CRYSTALS-Dilithium, selected by NIST for standardization. The algorithms are designed for two of the main tasks for which public-key cryptography is typically used—public key encapsulation (which is used for public-key encryption and key establishment) and digital signatures (which are used for identity authentication and non-repudiation).

Posted August 08, 2022

IBM Security released the annual Cost of a Data Breach Report, finding costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services.

Posted August 08, 2022

Flow Security is announcing its $10M seed round that facilitated the launch of a data security system that can locate and protect data, both at rest and in motion. Led by Amiti and backed by industry leaders like CyberArk CEO Udi Mokady, Demisto CEO, and co-founder Slavik Markovich, Flow Security's funding tackles data sprawl and security issues resulting from the industry shift towards cloud systems for data management.

Posted August 04, 2022

The continuous deployment (CD) company, Armory.io, is launching its CD Self-Hosted and Managed 2.28 product release for development teams seeking to continuously deploy software at a variety of scales in a trusted and straightforward mode. According to the vendor, a large focus of this product release is to aid elite developer teams execute code seamlessly. Upon deployment of the code, CD Self-Hosted and Managed will handle processes like testing, staging, and production.

Posted August 04, 2022

Traceable AI, a provider of API security and observability solutions, is adding extended Berkeley Packet Filter (eBPF) data to its platform, helping CISOs, DevSecOps, and DevOps teams obtain deeper observability and visibility into APIs without additional instrumentation or latency.

Posted August 03, 2022

Ask a data engineer why they got into the field, and they'll likely share how they looked forward to bringing concepts to life or solving complex challenges; or they wanted to share their expertise in a collaborative, agile environment; or they simply wanted to provide better visibility into the way products work for end users—and how it could be improved.

Posted August 03, 2022

The latest version of the BackBox Automation Platform revolutionizes customer experience through on-premises or cloud capability options for SaaS. This release provides network automation for managed service providers (MSPs), managed security service providers (MSSP), and enterprise users who will now be able to decide which configuration best suits their needs in increasingly hybrid environments. Customers will also have access to new features, like the executive dashboard, which impact inventory analytics and automation performance for concise automation processes.

Posted August 02, 2022

Relativity has announced its partnership with Veritas Technologies to provide an integrated customer experience for users of RelativityOne, Relativity Server, Enterprise Vault, eDiscovery Platform, Veritas Advanced Discovery, and Discovery Accelerator. This partnership will provide its collective user base with Relativity's AI-driven communication surveillance platform (Relativity Trace) backed by Veritas' data archiving systems and search platform.

Posted August 02, 2022

Avertium is releasing Fusion MXDR, a new service the security partner is providing for Microsoft Security customers, providing threat intelligence, attack surface monitoring, NIST CSF framework, and vulnerability management as part of a cyber maturity program for Microsoft Defender for Endpoint and Microsoft Sentinel.

Posted July 29, 2022

NetApp, a global, cloud-led, data-centric software company, is releasing Spot Security, delivering a solution for continuous assessment and analysis of cloud security posture. Spot Security enables DevOps and SecOps teams to easily collaborate to identify misconfigurations, reduce their potential attack surface, and ensure compliance. 

Posted July 28, 2022

Snyk, a provider of developer security, is introducing Snyk Cloud, a comprehensive cloud Security Solution designed by and for developers. Thoughtfully designed with global DevSecOps teams in mind, Snyk's Cloud Security solution unites and extends existing products Snyk Infrastructure as Code and Snyk Container with Fugue's leading cloud security posture management (CSPM) capabilities, according to the vendor.

Posted July 28, 2022

D2iQ, an enterprise Kubernetes provider for smart cloud-native applications, is partnering with Aqua Security, a pure-play cloud-native security company, to enable organizations to create a seamless DevSecOps experience that accelerates the deployment of secure smart cloud-native applications.

Posted July 28, 2022

BigID, provider of a data intelligence platform, is introducing security and privacy aware access control for AWS Cloud infrastructure to reduce risk and automate role-based policies across AWS including S3, Redshift, Athena, EMR, and more with extended integrations. By using BigID, AWS customers can automate intelligent access control to enable and restrict access to their sensitive data—while creating business policies based on data sensitivity and context, according to the vendor.

Posted July 27, 2022

SAP released 27 new and updated Security Notes, including six High Priority notes, during its July patch release. Onapsis Research Labs (ORL) supported SAP in patching a Missing Authorization Check vulnerability in the highly sensitive SAP Enterprise Extension Defense Forces & Public Security application.

Posted July 27, 2022

Rocket Software is offering a series of livestreams featuring its product roadmap for the future. The Rocket MultiValue product roadmap outlines the vision, direction, priorities, and progress of a product over time. It represents the plan of both short and long-term goals for Rocket's products.

Posted July 27, 2022

Cloudian announced that HyperStore object storage is now validated to work with Microsoft Azure Stack HCI, giving Azure Stack HCI customers the scalability and flexibility benefits of public cloud in a secure and cost-effective, cloud-native storage platform within their own data centers.

Posted July 26, 2022

Druva Inc. is expanding its cyber resilience portfolio with cyber-attack readiness innovations, including new capabilities for data posture assessment and observability. These advanced tools provide customers with a centralized view of their data security posture, deep visibility into data entropy changes, and the ability to assess data risks, according to the vendor.

Posted July 20, 2022

Following the integration and acquisition of several backup and recovery companies and solutions, Jungle Disk is rebranding as CyberFortress—a global company providing managed data backups built to prevent business disruption through rapid recovery. The acquisitions include KeepItSafe, LiveVault, and OffsiteDataSync from J2 Global.

Posted July 13, 2022

DataBank, a leading provider of enterprise-class colocation, interconnection, and managed services, is partnering with Corsa Security, a provider in automating firewall virtualization, to deploy, scale, and optimize its Palo Alto Networks ML-powered VM-Series Virtual Next-Generation Firewalls with speed, simplicity, and savings.

Posted July 13, 2022

Swimlane, the low-code security automation company, announced it has received $70 million in a growth funding round, accelerating the company's ongoing growth and operations on a global scale while continuing to advance its platform innovations in security automation ahead of the competition.

Posted July 11, 2022

Revelation's flagship platform, OpenInsight, is being upgraded to help ease the transition for users who may still be using older versions of the product. "We're pushing to get this out because the older versions of the product, the 9.X versions, are 10 or 15 years old now and has an end-of-life of March 30, 2023," said Mike Ruane, president and CEO of Revelation Software. "We're trying to squeeze as many user requests in this release as possible to make the transition seamless as possible."

Posted July 07, 2022

Crate.io, the enterprise data management company, is offering a new tier for CrateDB Cloud, offering the ability to deploy it with shared infrastructure resources and suspend compute power. With the deployment of this new tier of CrateDB Cloud, customers have access to more cost-effective options that enable use cases with changing requirements or smaller use cases with the flexibility to turn on and off compute power, according to the vendor.

Posted July 05, 2022

Retrospect, a StorCentric company, is introducing several platforms and updates across its security portfolio including Retrospect Cloud Storage, Retrospect Backup 19, and Retrospect Virtual 2022. "Ransomware is such a threat to businesses worldwide that Retrospect is focusing on providing tools for ransomware protection and detection to help defend crucial data from these cyber-security threats," said JG Heithcock, general manager, Retrospect, a StorCentric Company.

Posted June 30, 2022

Cloudflare, Inc., the security, performance, and reliability company, is introducing the Cloudflare One Partner Program, presenting a new way for the channel to integrate and extend Cloudflare One. By building on Cloudflare's comprehensive Zero Trust, Network-as-a-Service, and Cloud Email Security offerings, the Cloudflare One Partner Program enables partners to provide the architecture needed to keep today's organizations secure while speeding up their devices, applications, and entire networks, according to the vendor.

Posted June 28, 2022

Object Management Group (OMG) announced Responsible Computing (RC), a new consortium comprised of technology innovators working together to address sustainable development goals. Responsible computing is a systemic approach aimed at addressing current and future challenges in computing, including sustainability, ethics, and professionalism, stemming from the belief that is needed to think about technology in terms of its impact on people and the planet.

Posted June 27, 2022

IBM plans to acquire Randori, a leading attack surface management (ASM) and offensive cybersecurity provider, further advancing IBM's Hybrid Cloud strategy and strengthening its portfolio of AI-powered cybersecurity products and services. Randori helps clients continuously identify external facing assets, both on-premise or in the cloud, that are visible to attackers—and prioritize exposures which pose the greatest risk.   

Posted June 27, 2022

Splunk Inc., a data platform provider for security and observability, is offering new capabilities to power integrated security and observability on a shared data platform, helping organizations achieve end-to-end visibility, rapid time to investigation and action, and greater extensibility to solve data-centric challenges.

Posted June 23, 2022

When organizations move their SAP applications to a cloud provider, what they are really doing is placing their mission-critical application into someone else's hands—this exacerbates the need for more cybersecurity monitoring to ensure the provider is handling it with care. Beware, some cloud service providers offer a monitoring service, but the customer also needs to have a process in place to understand what activities are ongoing in the hosted SAP system. 

Posted June 23, 2022

Collibra has announced Collibra Protect with Snowflake, a new offering to help teams securely and quickly access data to drive better decision making. Collibra Protect enables users to create policies that mask sensitive data via a no-code interface, so they don't have to rely on technical resources. Users can apply policies and ensure data is protected across Snowflake. Collibra additionally provides teams with context about data to ensure that tailored policies can be put in place to protect personal information and drive better decision making. 

Posted June 23, 2022

As organizations across industries, from financial services to retail, move mission-critical workloads to the cloud, they must defend against security vulnerabilities from inside and outside the firewall that are resulting in more breaches and exposed data. To help customers protect their cloud applications and data against emerging threats, Oracle is expanding the built-in security services and capabilities of Oracle Cloud Infrastructure (OCI).

Posted June 23, 2022

Continuent is releasing Tungsten Clustering and Tungsten Replicator Versions 7.0.1, introducing 52 new features and improvements, along with critical bug fixes.

Posted June 22, 2022

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Sponsors