The TeamSHATTER blog is now part of Spiderlabs – Anterior
The TeamSHATTER blog is now part of Spiderlabs – Anterior
Posted 3 years ago

Many of you are probably already aware of the acquisition of Application Security, Inc. by Trustwave. As part of the acquisition, we are pleased to announce that TeamSHATTER is combining…

TeamSHATTER’s Analysis of the October 2013 Oracle CPU
TeamSHATTER’s Analysis of the October 2013 Oracle CPU
Posted 4 years ago

It’s the second Tuesday in October, so it is Oracle Critical Patch Update (CPU) time. The October 2013 CPU contains 127 fixes across Oracle’s Database, Fusion Middleware, Enterprise Manager, E-Business…

TeamSHATTER’s Analysis of the July 2013 Oracle CPU
TeamSHATTER’s Analysis of the July 2013 Oracle CPU
Posted 4 years ago

It is Oracle Critical Patch Update (CPU) time, so lace up your patching gloves. The July 2013 CPU contains 89 fixes across Oracle’s Database, Fusion Middleware, Hyperion, Enterprise Manager, E-Business…

PreviousNext
RSS

More Lawsuits Filed In Zappos Security Breach

Lawsuit

Amazon continues to feel the ire of customers angry over a January internet security breach that allowed hackers to crack subsidary Zappos.com’s computers and steal account numbers and other customer information. Nine federal class-action lawsuits have been filed against Amazon and/or Zappos related to the hacking, and Amazon says it expects more to come.  Click for complete article >>

Click for complete article >>

ANSI: Understand Consequences Of Data Breaches BEFORE They Occur

plastic caution tape

As adoption rates rise, health IT makes protected health information (PHI) available to more organizations and entities, increasing the likelihood of data being improperly disclosed, lost or stolen. Despite the risks and costs of a potential data breach, many healthcare executives aren’t doing enough to support their organizations’ security efforts, but researchers from the American National Standards Institute (ANSI) believe they’d do more if the far-reaching consequences of a breach were more clearly outlined. Click for complete article >>

Click for complete article >>

LulzSec Ringleader Arrested – What Happens Now?

Hacker In Jail

On Tuesday morning, members of so-called hacktivist groups discovered that they had been betrayed by one of their own. Four men in Britain and Ireland who were affiliated with Lulz Security, or LulzSec, a group loosely affiliated with the larger Anonymous hacking collective, were charged with computer crimes, and a fifth man was arrested in Chicago. They are accused of waging attacks against diverse, high-profile targets like Sony and the government of Tunisia. But the real shocker was that it…

Click for complete article >>

NASA Data Stolen In Security Breach

NASA logo

Nasa has admitted that the data of employees and mission-critical projects was stolen during 13 major security breaches in 2011. Hackers were able to get full functional control when they broke into Nasa’s Jet Propulsion Laboratory by using an internet protocol (IP) address in China, according to a testimony by Nasa inspector Paul Martin. Click for complete article >>

Click for complete article >>

Gartner: Database Activity Monitoring Evolves To Database Audit And Protection

Gartner

Jeffrey Wheatman and Ramon Krikken just published a new note each on database security. For a long time, the main solutions in this space were referred to as Database Activity Monitoring. Monitoring is still an incredibly important aspect, but the products have really grown up in the last couple years – so we’re renaming the solutions to more accurately reflect their capabilities and customer requirements: enter Database Audit and Protection. Click for complete article >>

Click for complete article >>

National Security Agency Pushes For Cybersecurity

NSA

The National Security Agency has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks but has been rebuffed by the White House, largely because of privacy concerns, according to administration officials and internal documents. The most contentious issue was a legislative proposal last year that would have required hundreds of companies that provide such critical services as electricity generation to allow their Internet traffic to be continuously scanned using computer threat data…

Click for complete article >>

Security In The Cloud – A Data Breach Is Only As Bad As Your Contract

Posted February 29, 2012 by in Breach Costs, Data Breach, Database Security with 0 comments
Contract

Loss of control is one of the main things that gives people pause when they think about putting their data in the cloud. We’ve all seen how painful a data breach can be, and it can seem almost like asking for trouble to put your data in the hands of someone else. It’s hard enough to prepare for a breach when you’re in control. How do you do it when you put someone else in charge? Click for complete article…

Click for complete article >>

Understanding And Selecting DSP: Core Components

Posted February 28, 2012 by in Data Breach, Database Security with 0 comments
DSP

Those of you familiar with DAM already know that over the last four years DAM solutions have been bundled with assessment and auditing capabilities. Over the last two years we have seen near universal inclusion of discovery and rights management capabilities. DAM is the centerpiece of a database security strategy, but as a technology it is just one of a growing number of important database security tools. We have already defined Database Security Platform, so now let’s spend a moment…

Click for complete article >>

Data Breaches are Getting Even Pricier

Money

The ruling more than a year ago by the 9th US Circuit Court of Appeals in Krottner v. Starbucks was the first in a cascade of legal and regulatory actions that promise to increase the costs of data breaches for US companies. The court ruled that, to take a case to trial, plaintiffs no longer need to show actual harm or imminent threat of harm from a data breach. They simply have to show increased risk of harm. As a…

Click for complete article >>

Old Data and Databases Pose as Security Threats

Old Data

When was the last time you deleted a database — not accidentally, but on purpose? Have you ever willfully deleted a database? How about removed sensitive data from one? Most database administrators I’ve spoken with have never retired the contents of a database. They may migrate the contents of the old database into a newly architected repository, but seldom have they just deleted a database. Or parsed out old data lying around that was clearly obsolete, or possibly truncated tables…

Click for complete article >>
Powered by