database

The Database Kill Chain
Modern attacks targeting sensitive data have become complex. An organization with many assets might be lost when trying to assess its overall risk, understand the pain points and prioritize the tasks required ...

Database Ransomware: From Attack to Recovery
Introduction In recent years, ransomware attacks have risen sharply, due to their profitability, ease of access with ransomware-as-a-service (RaaS) tools, and an increasing attack surface. Ransomware is a type of attack in ...
Major Database Security Threats & How You Can Prevent Them
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...

API Security 101: Security Misconfiguration
An overview of the most common security misconfigurations, a constant threat against API implementations.Photo by Anne Nygård on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten ...
Ghidra 101: Loading Windows Symbols (PDB files)
In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time ...
10 Database Security Best Practices You Should Know
According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of ...

The Data Lakehouse Post 2 – The Data Lakehouse Itself
In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do ...
The Data Lakehouse Post 1 – My Database Wishlist – A Rant
In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and ...
Don’t Let Your Stored Procedures Lack Integrity
Unfamiliar territory As a security analyst, engineer, or CISO, there are so many aspects of the field that require immediate attention that one cannot possibly know everything. Some of the common areas ...

What’s the Value of a Key-Value Store?
A database back end for your application is vital, and odds are that your database is a relational database or a "not only SQL" (NoSQL) database. Relational databases have dominated the software ...