News

Common misconceptions IT security has about database security: 1. “My databases are all behind firewalls and IDS/IPS so I’m protected”--Not so.Attacks can originate inside the organization ...
Poor data governance can lead to a myriad of issues that include data interpretation inconsistencies, security ...
While database security is (or should be) a top concern for companies now, many still make common mistakes that drastically increase the risk of data exposure, lost revenue, reputational damage ...
What’s Next for Vulnerability Management. While these new initiatives are generally welcomed by the software security community, a debate remains about how to develop the best metrics to provide the ...
SQL Injection (Injection Flaws) This type of web application vulnerability occurs when an attacker tries to employ the application code to gain access to a system — or to corrupt a database.
For a few hours this week, the future of the Common Vulnerabilities and Exposures (CVE) Program — a database used by companies and governments to learn about new security holes in the software they ...
The Common Vulnerabilities and Exposures database operated by nonprofit MITRE Corp will receive 11 months of federal support. A representative from the Cybersecurity and Infrastructure Security ...
Furthermore, ENISA plans for its database to support the Common Security Advisory Framework (CSAF), a machine-readable format of vulnerability advisories. Sarah Fluchs, CTO of admeritia GmbH ...
The Common Vulnerabilities and Exposures database operated by nonprofit MITRE Corp will receive 11 months of federal support. A representative from the Cybersecurity and Infrastructure Security ...