Data Masking

Data Masking

Organizations have to take several security measures while storing personal identifiable data, personal sensitive data or commercially sensitive data, such as credit card numbers, Social Security Numbers, bank account numbers etc in database. Often companies maintain strict security controls when the sensitive data is in storage or being used in the business. But, suppose some …

Read More

A comprehensive guide on security and privacy of your browser

A comprehensive guide on security and privacy of your browser

Securing the browser is extremely important. We use browser to browse the Internet and most of the cases malware infect a computer through browser only. Sometimes we accidentally click on unsafe links or visit unsafe websites unknowingly and our computer gets infected by malware. But, if we take a couple of precautions, we can prevent …

Read More

A Guide To Database Activity Monitoring

A Guide To Database Activity Monitoring

What is Database Activity Monitoring ? Database Activity Monitoring or DAM is a database security technology that is used for monitoring and analyzing database activity. It operates independently of the DBMS and performs continuously in real time or near real time. Database Activity Monitors capture and record all database activity including database administrator activities across …

Read More

A Guide To SIEM or Security Information and Event Management

A Guide To SIEM or Security Information and Event Management

What is SIEM or Security Information and Event Management ? Security Information and Event Management or SIEM is an approach to provide a holistic view of an organization’s security. An organization may use various security tools and products that can create thousands of logs. Looking through all those logs located at different locations and deriving …

Read More

DBShield : Go Based Database Firewall

DBShield - Go Based Database Firewall

Database Firewall is a type of Web Application Firewall or WAF that monitors all the database queries made to the database server and the responses from the server to detect and prevent unauthorized access or modification of the database. We already discussed on what Database Firewall basically is and how it works in our last …

Read More

Page 1 of 212