Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

These days, data managers have an embarrassment of riches when it comes to the platforming, storage, and provisioning of data and associated analytics applications. However, selecting the right environment for pressing business needs can be confusing and overwhelming. The key is understanding how to map the right technologies to the business problems or opportunities at hand.

Posted August 11, 2022

Assuring data quality should be one of the most important goals for IT professionals. This is truer today than it has ever been as organizations rely on data to power their AI and machine learning algorithms. Accurate, quality data is required if you want to make accurate decisions. And that is true, whether the data is being analyzed by a human or a computer algorithm.

Posted August 11, 2022

Accelerated digital transformation has been felt in a variety of ways across all industry sectors for the past 2 years. Digital infrastructure resiliency and agility are crucial in periods of uncertainty and disruption, which many organizations are experiencing with the confluence of disrupted supply chains, rising inflation, geopolitical instability, energy price spikes, the ongoing global pandemic, and climate change.

Posted August 10, 2022

NetSPI, an enterprise penetration testing and attack surface management company, is releasing two new open-source tools for identity and access management (IAM) and security operations center (SOC) groups. These tools, PowerHuntShares and PowerHunt, will aid information security teams discover vulnerable network shares and improve detections overall.

Posted August 09, 2022

Kyligence, an open source Online Analytical Processing platform (OLAP) for big data, is announcing its completion of System and Organization Controls (SOC) 2 Type II certification, meaning it now adheres to the American Institute of Certified Public Accountants (AICPA).This is preceded by their completion of SOC Type I in 2021, assuring Kyligence's continued compliance through third-party auditing office, Ernst & Young.

Posted August 09, 2022

Canonic Security is launching AppTotal API, providing security teams the means for Canonic App Access & Vulnerability automation and integration within their workflows, pre-existing app vetting, and governance systems. AppTotal, an independent index of SaaS add-ons and integrations, is being configured with this API layer to improve automation without the risk of security breaches for app-to-IT-system connectivity. 

Posted August 08, 2022

More than ever, people are concerned for their data privacy. This modern problem has ramifications for industries regarding data management, generating an important question: how do you responsibly leverage data in a world concerned about data privacy and safety? As risk and concern continues to increase surrounding data management, innovations towards legal and ethical management tools and standards intend to make way for establishing trust between company and data subjects.

Posted August 08, 2022

With IBM z16, application developers can preserve the future integrity of critical documents by implementing dual-signing schemes using the lattice-based cryptographic algorithm CRYSTALS-Dilithium, selected by NIST for standardization. The algorithms are designed for two of the main tasks for which public-key cryptography is typically used—public key encapsulation (which is used for public-key encryption and key establishment) and digital signatures (which are used for identity authentication and non-repudiation).

Posted August 08, 2022

IBM Security released the annual Cost of a Data Breach Report, finding costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services.

Posted August 08, 2022

Flow Security is announcing its $10M seed round that facilitated the launch of a data security system that can locate and protect data, both at rest and in motion. Led by Amiti and backed by industry leaders like CyberArk CEO Udi Mokady, Demisto CEO, and co-founder Slavik Markovich, Flow Security's funding tackles data sprawl and security issues resulting from the industry shift towards cloud systems for data management.

Posted August 04, 2022

The continuous deployment (CD) company, Armory.io, is launching its CD Self-Hosted and Managed 2.28 product release for development teams seeking to continuously deploy software at a variety of scales in a trusted and straightforward mode. According to the vendor, a large focus of this product release is to aid elite developer teams execute code seamlessly. Upon deployment of the code, CD Self-Hosted and Managed will handle processes like testing, staging, and production.

Posted August 04, 2022

Traceable AI, a provider of API security and observability solutions, is adding extended Berkeley Packet Filter (eBPF) data to its platform, helping CISOs, DevSecOps, and DevOps teams obtain deeper observability and visibility into APIs without additional instrumentation or latency.

Posted August 03, 2022

Ask a data engineer why they got into the field, and they'll likely share how they looked forward to bringing concepts to life or solving complex challenges; or they wanted to share their expertise in a collaborative, agile environment; or they simply wanted to provide better visibility into the way products work for end users—and how it could be improved.

Posted August 03, 2022

The latest version of the BackBox Automation Platform revolutionizes customer experience through on-premises or cloud capability options for SaaS. This release provides network automation for managed service providers (MSPs), managed security service providers (MSSP), and enterprise users who will now be able to decide which configuration best suits their needs in increasingly hybrid environments. Customers will also have access to new features, like the executive dashboard, which impact inventory analytics and automation performance for concise automation processes.

Posted August 02, 2022

Relativity has announced its partnership with Veritas Technologies to provide an integrated customer experience for users of RelativityOne, Relativity Server, Enterprise Vault, eDiscovery Platform, Veritas Advanced Discovery, and Discovery Accelerator. This partnership will provide its collective user base with Relativity's AI-driven communication surveillance platform (Relativity Trace) backed by Veritas' data archiving systems and search platform.

Posted August 02, 2022

Avertium is releasing Fusion MXDR, a new service the security partner is providing for Microsoft Security customers, providing threat intelligence, attack surface monitoring, NIST CSF framework, and vulnerability management as part of a cyber maturity program for Microsoft Defender for Endpoint and Microsoft Sentinel.

Posted July 29, 2022

NetApp, a global, cloud-led, data-centric software company, is releasing Spot Security, delivering a solution for continuous assessment and analysis of cloud security posture. Spot Security enables DevOps and SecOps teams to easily collaborate to identify misconfigurations, reduce their potential attack surface, and ensure compliance. 

Posted July 28, 2022

Snyk, a provider of developer security, is introducing Snyk Cloud, a comprehensive cloud Security Solution designed by and for developers. Thoughtfully designed with global DevSecOps teams in mind, Snyk's Cloud Security solution unites and extends existing products Snyk Infrastructure as Code and Snyk Container with Fugue's leading cloud security posture management (CSPM) capabilities, according to the vendor.

Posted July 28, 2022

D2iQ, an enterprise Kubernetes provider for smart cloud-native applications, is partnering with Aqua Security, a pure-play cloud-native security company, to enable organizations to create a seamless DevSecOps experience that accelerates the deployment of secure smart cloud-native applications.

Posted July 28, 2022

BigID, provider of a data intelligence platform, is introducing security and privacy aware access control for AWS Cloud infrastructure to reduce risk and automate role-based policies across AWS including S3, Redshift, Athena, EMR, and more with extended integrations. By using BigID, AWS customers can automate intelligent access control to enable and restrict access to their sensitive data—while creating business policies based on data sensitivity and context, according to the vendor.

Posted July 27, 2022

SAP released 27 new and updated Security Notes, including six High Priority notes, during its July patch release. Onapsis Research Labs (ORL) supported SAP in patching a Missing Authorization Check vulnerability in the highly sensitive SAP Enterprise Extension Defense Forces & Public Security application.

Posted July 27, 2022

Rocket Software is offering a series of livestreams featuring its product roadmap for the future. The Rocket MultiValue product roadmap outlines the vision, direction, priorities, and progress of a product over time. It represents the plan of both short and long-term goals for Rocket's products.

Posted July 27, 2022

Cloudian announced that HyperStore object storage is now validated to work with Microsoft Azure Stack HCI, giving Azure Stack HCI customers the scalability and flexibility benefits of public cloud in a secure and cost-effective, cloud-native storage platform within their own data centers.

Posted July 26, 2022

Druva Inc. is expanding its cyber resilience portfolio with cyber-attack readiness innovations, including new capabilities for data posture assessment and observability. These advanced tools provide customers with a centralized view of their data security posture, deep visibility into data entropy changes, and the ability to assess data risks, according to the vendor.

Posted July 20, 2022

Following the integration and acquisition of several backup and recovery companies and solutions, Jungle Disk is rebranding as CyberFortress—a global company providing managed data backups built to prevent business disruption through rapid recovery. The acquisitions include KeepItSafe, LiveVault, and OffsiteDataSync from J2 Global.

Posted July 13, 2022

DataBank, a leading provider of enterprise-class colocation, interconnection, and managed services, is partnering with Corsa Security, a provider in automating firewall virtualization, to deploy, scale, and optimize its Palo Alto Networks ML-powered VM-Series Virtual Next-Generation Firewalls with speed, simplicity, and savings.

Posted July 13, 2022

Swimlane, the low-code security automation company, announced it has received $70 million in a growth funding round, accelerating the company's ongoing growth and operations on a global scale while continuing to advance its platform innovations in security automation ahead of the competition.

Posted July 11, 2022

Revelation's flagship platform, OpenInsight, is being upgraded to help ease the transition for users who may still be using older versions of the product. "We're pushing to get this out because the older versions of the product, the 9.X versions, are 10 or 15 years old now and has an end-of-life of March 30, 2023," said Mike Ruane, president and CEO of Revelation Software. "We're trying to squeeze as many user requests in this release as possible to make the transition seamless as possible."

Posted July 07, 2022

Crate.io, the enterprise data management company, is offering a new tier for CrateDB Cloud, offering the ability to deploy it with shared infrastructure resources and suspend compute power. With the deployment of this new tier of CrateDB Cloud, customers have access to more cost-effective options that enable use cases with changing requirements or smaller use cases with the flexibility to turn on and off compute power, according to the vendor.

Posted July 05, 2022

Retrospect, a StorCentric company, is introducing several platforms and updates across its security portfolio including Retrospect Cloud Storage, Retrospect Backup 19, and Retrospect Virtual 2022. "Ransomware is such a threat to businesses worldwide that Retrospect is focusing on providing tools for ransomware protection and detection to help defend crucial data from these cyber-security threats," said JG Heithcock, general manager, Retrospect, a StorCentric Company.

Posted June 30, 2022

Cloudflare, Inc., the security, performance, and reliability company, is introducing the Cloudflare One Partner Program, presenting a new way for the channel to integrate and extend Cloudflare One. By building on Cloudflare's comprehensive Zero Trust, Network-as-a-Service, and Cloud Email Security offerings, the Cloudflare One Partner Program enables partners to provide the architecture needed to keep today's organizations secure while speeding up their devices, applications, and entire networks, according to the vendor.

Posted June 28, 2022

Object Management Group (OMG) announced Responsible Computing (RC), a new consortium comprised of technology innovators working together to address sustainable development goals. Responsible computing is a systemic approach aimed at addressing current and future challenges in computing, including sustainability, ethics, and professionalism, stemming from the belief that is needed to think about technology in terms of its impact on people and the planet.

Posted June 27, 2022

IBM plans to acquire Randori, a leading attack surface management (ASM) and offensive cybersecurity provider, further advancing IBM's Hybrid Cloud strategy and strengthening its portfolio of AI-powered cybersecurity products and services. Randori helps clients continuously identify external facing assets, both on-premise or in the cloud, that are visible to attackers—and prioritize exposures which pose the greatest risk.   

Posted June 27, 2022

Splunk Inc., a data platform provider for security and observability, is offering new capabilities to power integrated security and observability on a shared data platform, helping organizations achieve end-to-end visibility, rapid time to investigation and action, and greater extensibility to solve data-centric challenges.

Posted June 23, 2022

When organizations move their SAP applications to a cloud provider, what they are really doing is placing their mission-critical application into someone else's hands—this exacerbates the need for more cybersecurity monitoring to ensure the provider is handling it with care. Beware, some cloud service providers offer a monitoring service, but the customer also needs to have a process in place to understand what activities are ongoing in the hosted SAP system. 

Posted June 23, 2022

Collibra has announced Collibra Protect with Snowflake, a new offering to help teams securely and quickly access data to drive better decision making. Collibra Protect enables users to create policies that mask sensitive data via a no-code interface, so they don't have to rely on technical resources. Users can apply policies and ensure data is protected across Snowflake. Collibra additionally provides teams with context about data to ensure that tailored policies can be put in place to protect personal information and drive better decision making. 

Posted June 23, 2022

As organizations across industries, from financial services to retail, move mission-critical workloads to the cloud, they must defend against security vulnerabilities from inside and outside the firewall that are resulting in more breaches and exposed data. To help customers protect their cloud applications and data against emerging threats, Oracle is expanding the built-in security services and capabilities of Oracle Cloud Infrastructure (OCI).

Posted June 23, 2022

Continuent is releasing Tungsten Clustering and Tungsten Replicator Versions 7.0.1, introducing 52 new features and improvements, along with critical bug fixes.

Posted June 22, 2022

Traceable AI, a leading API security and observability company, is introducing an enhanced API Catalog solution, enabling organizations to overcome their challenges with API discovery and risk assessment.

Posted June 21, 2022

iboss, a provider in Zero Trust Edge, is expanding its relationship with Microsoft by joining the Microsoft Intelligent Security Association (MISA), giving joint customers the benefit of secure, fast access to resources from anywhere. MISA is an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP) that have integrated their security products and services with Microsoft's security products.

Posted June 15, 2022

Snowflake announced a series of significant updates to its product portfolio, with new capabilities for developers, data professionals, and analytics teams to gain insights on real-time transactional data and build products and apps faster. These announcements were made during the company's annual conference, Snowflake Summit.

Posted June 15, 2022

As everyone pushes for real-time analytics, more responsive online services, and more protection against cybercrime, data resiliency has moved front and center. Put simply, data must be available at all times. This requires a shift in con­ventional thinking toward data resiliency strategies in rec­ognition of the fact that it is no longer a technical issue; it's a business issue.

Posted June 15, 2022

Okera has announced the immediate availability of Okera on Snowflake,, a new software as a service (SaaS) offering for the Snowflake Data Cloud. Leveraging the new SaaS solution, non-technical data stakeholders in business, security, and compliance can collaborate with a significantly smaller data engineering team to define data access control policies, validate that data policies are implemented as intended, and self-serve their own data privacy compliance reports and real-time analytics.

Posted June 14, 2022

Kaizen Analytix LLC, a provider of data, analytics, and technology solutions, is releasing its new Anomaly Detection Engine that systematically searches through all segments of a company's data to quickly identify outliers which lead to fraud, customer churn, revenue leakage, and other issues.

Posted June 13, 2022

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70

Sponsors