General

F520f65cba281c31e29c857faa651872

The Road to Effective Information Management

November 05, 2010 Added by:Rahul Neel Mani

EMC completed its first 10 years in India. EMC has come a long way from being a storage box pusher to a preferred information management partner. Manoj Chugh, President EMC India in an exclusive conversation with Rahul Neel Mani talks about how the company grew both in size and stature...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Information Based Enterprise Plagued by Fraud

October 27, 2010 Added by:Thomas Fox

According to the 2010 Kroll survey, 88% of companies have been victims of fraud in the past year. Information-based industries reported the highest incidence of theft of data over the past 12 months - these include financial and professional services, technology, media and telecoms...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Securing Your Business Email Archive

October 26, 2010 Added by:Simon Heron

Email archiving is compulsory for some businesses, that have to keep old emails for compliance reasons, but all businesses should have an archiving system which makes correspondence quick and easy to find and that keeps business and personal data secure...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Check Your Database Configurations

September 23, 2010 Added by:Application Security, Inc.

There are a myriad of Database Management System configuration options - many related to performance and enhanced feature sets. Having the correct configuration settings could determine whether your critical business information is secure or whether it could be compromised...

Comments  (0)

F520f65cba281c31e29c857faa651872

DLP Decisions Should Be Based on Requirements

September 18, 2010 Added by:Rahul Neel Mani

Mahendra Negi, COO & CFO, Trend Micro has been acknowledged as one of the top Internet analysts in Japan. In a freewheeling discussion, he touches upon various issues that concern the information security industry...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Minimizing Your Attack Surface

September 08, 2010 Added by:Application Security, Inc.

Database Management Systems have extended far beyond the simple data storage systems, and are now impressive software packages in their own right. They now offer features to analyze and report on data, run Java and other extensible languages, and have various levels of OS access built in...

Comments  (2)

46d1980e375ce08915b30d9a328c2fdc

Extensive User and Group Privileges

August 16, 2010 Added by:Application Security, Inc.

The process of collecting a comprehensive list of all rights that a user has can become a daunting task. Privileges aren't typically just assigned directly to the users they also inherit privileges from groups or roles they belong to...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Back From Black Hat

August 06, 2010 Added by:Application Security, Inc.

With so many tracks there was no shortage of interesting topics at the same time slot. Since there were no database specific talks on the first day, I had a great opportunity to expand my horizon and check out some areas that I’m only somewhat familiar with - here's a summary...

Comments  (1)

46d1980e375ce08915b30d9a328c2fdc

Checking if ADMIN_RESTRICTIONS is Enabled

August 04, 2010 Added by:Application Security, Inc.

In order to check the ADMIN_RESTRICTIONS flag, it usually requires proper credentials to the Oracle database. However, there is an unofficial way to work around this if you have access to the listener...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Understanding SQL Injections in the Database Management System

July 28, 2010 Added by:Application Security, Inc.

Similar to the Web-based variant, SQL Injection in the DBMS exploits passing SQL commands as a parameter of a function or stored procedure. This will then execute the malicious SQL commands in the context of the component that provides the called function...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

Data Leakage Going Gaga

July 12, 2010 Added by:Ron Baklarz

Data Leakage occurred when a 22 year old soldier in Iraq, Pfc. Bradley E. Manning, allegedly downloaded more than 150,000 diplomatic cables, as well as secret videos and a PowerPoint presentation onto CD ROM discs disguised as a Lady Gaga CD...

Comments  (3)

72cc4c5e6cbde70aa374bf94076ad722

Using Information Rights Management to Prevent Snooping by IT Staff

July 09, 2010 Added by:Peter Abatan

In a recent news article a survey carried out by Cyber-Ark global survey claimed that 41% of IT pros admit to snooping on confidential information. Forty-one percent of respondents confessed to abusing administrative passwords to snoop on sensitive or confidential information...

Comments  (5)

D13f77e036666dbd8f93bf5895f47703

Analysis on Defense and Cyber Warfare

July 08, 2010 Added by:Theresa Payton

Cyber war is not limited necessarily just between countries, as Google found out earlier this year. Countries have the ability to attack private companies, which could cause power outages, massive financial theft, or the loss of private information of millions of people...

Comments  (5)

959779642e6e758563e80b5d83150a9f

Effective Database Activity Monitoring

July 08, 2010 Added by:Danny Lieberman

It seems that DLP vendors are moving up the food chain into DAM (database activity monitoring?). As customers deploy two products in parallel for DLP and DAM – the opportunity for reducing TCO seems to be a clear imperative...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

SANS Log Management Class in California?

July 06, 2010 Added by:Anton Chuvakin

I have authored a SANS Log Management Class (SEC434) which is almost out of beta and near production stage, after a few years of tuning and trial runs. We are thinking of teaching it in California during the second week of August 2010...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Where are the DBAs?

October 07, 2009 Added by:Infosec Island Admin

What I really want to know is this: Where are the Database Admins (DBAs) these days? I cant tell you how many times in the past 18 months that I’ve found real enterprises running vulnerable databases with default passwords, weak passwords and no real permissions management.

Comments  (3)

Page « < 8 - 9 - 10 - 11 - 12 > »