News

Poor data governance can lead to a myriad of issues that include data interpretation inconsistencies, security ...
Common misconceptions IT security has about database security: 1. “My databases are all behind firewalls and IDS/IPS so I’m protected”--Not so.Attacks can originate inside the organization ...
While database security is (or should be) a top concern for companies now, many still make common mistakes that drastically increase the risk of data exposure, lost revenue, reputational damage ...
SQL Injection (Injection Flaws) This type of web application vulnerability occurs when an attacker tries to employ the application code to gain access to a system — or to corrupt a database.
What’s Next for Vulnerability Management. While these new initiatives are generally welcomed by the software security community, a debate remains about how to develop the best metrics to provide the ...
The Common Vulnerabilities and Exposures database operated by nonprofit MITRE Corp will receive 11 months of federal support. A representative from the Cybersecurity and Infrastructure Security ...
For a few hours this week, the future of the Common Vulnerabilities and Exposures (CVE) Program — a database used by companies and governments to learn about new security holes in the software they ...
Europe may not have total faith in the US’s Common Vulnerabilities and Exposures (CVE) database, so it has created its own version. As of May 13, the European Vulnerability Database is up and ...
The Common Vulnerabilities and Exposures database operated by nonprofit MITRE Corp will receive 11 months of federal support. A representative from the Cybersecurity and Infrastructure Security ...