Database Blog


  • Database Patch News — June 2020 (Issue 4)

    Jun 29, 2020

    Reading Time: 2 minutes Welcome to Database Patch News, Buda Consulting’s newsletter of current patch information for Oracle and Microsoft SQL Server.

    Read more Add new comment
  • It’s in the Database

    Mar 3, 2020

    Reading Time: < 1 minute Managed Health Systems of Indiana patient health information, July-September, 2019; Microsoft customer service and support records, January 22, 2020; Wyze email addresses, December 30, 2019; Georgia Tech student data, March 2019. What do all of these breaches have in common? The data that was stolen was inside a database. Yet when most companies think about data security, they still focus on securing the network, and spend very little time and energy making sure the databases—where…..

    Read more Add new comment
  • MySQL and MariaDB Encryption Options

    Dec 10, 2019

    Reading Time: 4 minutes MySQL and MariaDB Encryption Options Encryption remains one of the most widely used cornerstones of data security across organizations of all sizes and industries. Why? In many cases it’s both effective and relatively simple to implement. There are two fundamental encryption capabilities that are almost universally necessary for basic data security: The ability to encrypt sensitive data “at rest”—that is, where it resides on disk—is a critical security capability for many organizations and applications, as…..

    Read more Add new comment
  • Oracle Data Encryption Options

    Nov 21, 2019

    Reading Time: 2 minutes Oracle offers various authentication and audit features to protect data from unauthorized access. But what about data at rest in operating system files, backups or other storage media?

    Read more Add new comment
  • You Need More than a Firewall to Protect Your Oracle Databases

    Feb 19, 2015

    Reading Time: 2 minutes Unless you’ve been in suspended animation for the past few years, you know that major government agencies and global enterprises are hacked with numbing regularity despite their best efforts to defend themselves. Whether from nation states, cybercriminals or disgruntled staff, your Oracle databases are vulnerable to similar attack. In most organizations, two-thirds of sensitive and regulated data resides in databases. Those databases represent your organization’s “crown jewels,” yet they may as exposed as if they…..

    Read more Add new comment
  • Anatomy of a Database Security Assessment

    Oct 22, 2014

    Reading Time: 3 minutes Data security is not a “set it and forget it” condition—it’s highly dynamic, changing as your environment evolves, new threats appear and new vulnerabilities are introduced. And as the recent rash of high-profile breaches in retail databases illustrate, securing your databases is at least as important as securing other parts of your infrastructure. The end of the year is often a time when we get things organized and throw out what we don’t need. It’s…..

    Read more Add new comment
  • Top Oracle Database Security Threats Come from the Inside

    Sep 20, 2014

    Reading Time: 2 minutes Your Oracle databases contain some of your company’s most valuable assets: financial data, customer data, intellectual property, corporate secrets and so on. That means they’ll be among the top targets of cybercriminals—both outside and inside the firewall. The fact that they sit behind your network doesn’t mean your Oracle databases aren’t vulnerable. And with the increase in the number and usage of databases, the frequency of attacks is also on the rise. While threats to…..

    Read more Add new comment