Please turn on your JavaScript for this page to function normally.
High Performance MySQL

High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …

Mistakes that led to the massive Utah data breach

A little over a month ago, the largest data breach in Utah history resulted in the compromise of Social Security numbers of some 280,000 Medicaid and Children’s Health …

Simplexo SDK enhances database security

A new Software Developers Kit (SDK), designed to keep all information stored in corporate databases secure, has been launched by Simplexo. Simplexo Data-Secure SDK has been …

Sophos finds unauthorized RATs on server, takes partner portal offline

Renowned security firm Sophos has taken down one of its partner portals (located at ) following the discovery of a compromise of the server on which it’s hosted. …

MySQL Troubleshooting

Stuck with bugs, performance problems, crashes, data corruption, and puzzling output? If you’re a database programmer or DBA, they’re part of your life. The trick …

SQL injection main database security concern among SMBs

GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …

Open source audit plug-in for MySQL

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …

Security for MySQL and Teradata databases

McAfee announced its new McAfee Database Activity Monitoring solution offering reliable, real-time protection for business-critical databases. The solution enables …

Eliminating malware resident on file shares

FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of …

Protect data by finding forgotten databases

Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …

Greatest risks to database security

The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …

Don't miss

Cybersecurity news