Microsoft and Imperva Collaboration Bolsters Data Compliance and Security Capabilities

This article explains how Imperva SecureSphere V13.2 has leveraged the latest Microsoft EventHub enhancements to help customers maintain compliance and security controls as regulated or sensitive data is migrated to Azure SQL database instances. Database as a Service Benefits Platform as a Service (PaaS) database offerings such as Azure SQL are rapidly becoming a popular option […]

Link: http://feedproxy.google.com/~r/Imperviews/~3/Nr7h3i-e390/

Explainer Series: RDaaS Security and Managing Compliance Through Database Audit and Monitoring Controls

As organizations move to cloud database platforms they shouldn’t forget that data security and compliance requirements remain an obligation. This article explains how you can apply database audit and monitoring controls using Imperva SecureSphere V13.2 when migrating to database as a service cloud offering. Introduction to RDaaS A Relational Database as a Service (RDaaS) provides […]

Link: http://feedproxy.google.com/~r/Imperviews/~3/_swm6_okMpY/

Report: Nearly Half of Security Professionals Think They Could Execute a Successful Insider Attack on Their Organization

As potential threats and entry points into organizations’ databases keep growing, so does the amount of money folks are throwing at detecting and actioning insider threats. In fact, the ballooning amount of money being spent on cybersecurity overall clearly highlights the seriousness with which businesses are tackling the problem in general. Identifying and containing data […]

Link: http://feedproxy.google.com/~r/Imperviews/~3/BMpd3DQZvF4/

A Bug in Chrome Gives Bad Actors License to Play ‘20 Questions’ with Your Private Data

In a 2013 interview with The Telegraph, Eric Schmidt, then CEO of Google was quoted as saying: “You have to fight for your privacy or lose it.” Five years later, with the ‘Cambridge Analytica’ data breach scandal fresh in our memory, Eric Schmidt’s statement rings as a self-evident truth. Similarly clear today is the nature of the […]

Link: http://feedproxy.google.com/~r/Imperviews/~3/MPyN9P2uT1s/

A Quick-Start Introduction to Database Security: An Operational Approach

The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of Personally Identifiable Information (PII) data. The recommended security measures covered several facets of IT security domains: Data governance and data management lifecycle Identity […]

Link: http://feedproxy.google.com/~r/Imperviews/~3/Rqzo5UDn74k/