eCommerce sites: Preventing insider threats

Every day we see headlines with data breaches on major eCommerce sites, including Target, Living Social, LinkedIn, and JC Penny. How is this happening? All of these sites use Web Application Firewalls (WAF) and secure connections. The answer is that most attacks on eCommerce sites are insider attacks, just as 80% of data breaches in [...]

Read More
Pass Summit 2014 Sponsor

PASS the SQL Server, and don’t pass up the prizes

We’re having a blast at the PASS Summit this year. If you haven’t been by our booth, you’ve been missing out on some high-risk behavior from the risk-elimination people at GreenSQL. We’ve got a prize wheel and we ain’t afraid to spin it. You can win free Amazon bucks, free software, and of course, our [...]

Read More

Achieving Compliance in the Cloud

Cloud-hosted databases can offer great benefits for organizations in terms of high availability, flexibility, rapid provisioning, cost-effectiveness, and even security. You can subscribe to Database as a Service (DBaaS) from the major vendors, and a number of vendors are also offering compliance as a service. However, it’s important to know exactly what you are getting. [...]

Read More

Updating the guidelines for preventing SQLi attacks

Are you following the same guidelines and measures for SQL injection prevention that have the norm for the past decade? If those guidelines were so great, we wouldn’t have seen breaches in 2014 at Adobe, NASA, Yahoo, Living Social, Domino’s Pizza, the FBI, LinkedIn Sony Pictures, Diners Club, Nokia, NASDAQ, Wetseal, and JC Penny… the [...]

Read More

Must-have checklist for SQL Server Security on AWS

If you’re jumping on the bandwagon and moving to the cloud with AWS, you’ll love our easy-to-use checklist for AWS security. We’ve put together a comprehensive list so that anyone implementing SQL server on AWS can take care of all the areas of security for cloud-based databases.   As we’ve mentioned before in our blog, [...]

Read More