...
Read More
...
Read More
...
Read More
...
Read More
...
Read More
...
Read More
...
Read More

The 4 soft skills of Unix security

By RDBAE Press on Dec 23

System administrators have favored Unix for its simplicity and versatility - two traits most open source programs possess. Not to mention, the operating system is free.

...
Read More
...
Read More

The Database Protection Series - Evaluating the Most Common Database Threats and Vulnerabilities- Part 1

By Chris Foot on Dec 22

This is the second article of a series that focuses on securing your database data stores. In the introduction, I provide an overview of the database protection process and what is to be discussed in future installments. Before we begin the activities required to secure our databases, we need to have a firm understanding of the most common database vulnerabilities and threats.

...
Read More
...
Read More
...
Read More

Preparing for the end of Windows Server 2003

By RDBAE Press on Dec 01

Although support for Windows Server 2003 doesn't end until July of next year, enterprises that have used the operating system since its inception are transitioning to the solution's latest iteration, Windows Server 2012 R2.

...
Read More

Database active monitoring a strong defense against SQL injections

By RDBAE Press on Dec 01

SQL injections have been named as the culprits of many database security woes, including the infamous Target breach that occurred at the commencement of last year's holiday season.

...
Read More

​Be sure to Choose
the Right Provider
Download our free guide

Important
Questions to Ask

when choosing a
Remote DBA Provider
This simple .pdf will help ensure you efficiently evaluate remote DBA companies
Download NOW!