by Buda Consulting | Feb 6, 2023 | Database Security
Microsoft SQL Server and Microsoft Azure SQL Database offer two complementary encryption options: Transparent Data Encryption (TDE) and Always Encrypted. This blog post will help you decide when to use TDE versus Always Encrypted, and when to combine them for a...
by Buda Consulting | Jan 17, 2023 | Best Practices, Database Security, Oracle
Organizations need to keep a close watch on Oracle operations to ensure agreed service levels are always being met. Database downtime can quickly lead to financial and reputational impacts, making periodic Oracle database assessments integral to the smooth operation...
by Buda Consulting | Jan 12, 2023 | Database Security
While a good Cybersecurity Framework specifies the implementation of controls to mitigate information-related risk for the full life cycle of critical data, in practice I have observed that in many organizations the framework implementation tends to focus on the...
by Buda Consulting | Aug 25, 2022 | Best Practices, Database Security
I recently appeared on an episode of The Virtual CISO Podcast hosted by my friend John Verry titled “Confronting the Wild West of Database Security.” In our conversation, I emphasized that despite the criticality of the data involved, many companies fail to appreciate...
by Buda Consulting | Jul 25, 2022 | Best Practices, Database Security
As John Verry and I discussed in a recent virtual CISO podcast episode, many people think of database security as they think of bank vaults. They secure the perimeter, place the valuables in the vault (database), and then assume those valuables are as safe as if they...
by Buda Consulting | Mar 21, 2022 | Database, Database Security
Availability of your database environment and continuous database protection is business-critical. Without continuous database protection, you can’t ensure business continuity. But it’s only a matter of time before you experience a failure. When (not if) that happens,...