What's new in PostgreSQL 9.4?

By RDBAE Press on Jan 30

Hi, welcome to RDX! The PostgreSQL Global Development Group recently unveiled PostgreSQL 9.4. The open source community maintains this iteration reinforces the group's three core values: flexibility, scalability and performance.

...
Read More

2 Cybersecurity considerations Obama made in his address [VIDEO]

By RDBAE Press on Jan 29

Hi, welcome to RDX! If you didn't catch President Obama's State of the Union address, cybersecurity was a serious topic of discussion. To improve the United States' ability to combat cybercriminals, Obama made two recommendations.

...
Read More
...
Read More

Is Linux haunted by ghosts?

By RDBAE Press on Jan 28

While malicious spirits aren't invading the house of Linus Torvald, there is a serious vulnerability in Linux that enables attackers to execute malicious code on servers running the OS.

...
Read More

How invested are millennials in cybersecurity?

By RDBAE Press on Jan 27

As 2014 is increasingly becoming known as "the year of the breach" among some, security analysts are looking toward the future.

...
Read More

SQL Server gains several notable features

By RDBAE Press on Jan 26

Cloud migration tools, hybrid cloud compatibility features and analytics capabilities are just a few of the accommodations database administrators are favoring nowadays. Throughout 2014, Microsoft made a number of revisions to its signature database engine SQL Server, which is a solution of choice among many DBA experts. 

...
Read More

Backdoor vulnerability puts Oracle database users at risk

By RDBAE Press on Jan 21

Companies using Oracle's database engine to support their enterprise application and information storage needs should consider consulting Oracle experts to help them patch a bug that could allow infiltrators to completely take over their systems. 

...
Read More
...
Read More

IS flexes its hacking skills

By RDBAE Press on Jan 19

The Islamic State in Iraq and the Levant has received much attention as of late, and not for nothing.

...
Read More
...
Read More
...
Read More

The Database Protection Series– Common Threats and Vulnerabilities Part 2

By Chris Foot on Jan 16

This is the third article of a series that focuses on database security. In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments. In last month’s article, we began with a review of the various database vulnerabilities and threat vectors we need to address. In this article we’ll finish our discussion of the most common threats and vulnerabilities. In the next installment of this series, we’ll take a look at the database vulnerability analysis process. We’ll begin by learning how to perform an initial database vulnerability assessment. In addition, we’ll discuss the importance of performing assessments on a regular basis to ensure that no new security vulnerabilities are introduced into our environment.

...
Read More

President Obama takes stand against hackers

By RDBAE Press on Jan 14

Legislation pertaining to cybersecurity is a topic of discussion that isn't going away. Cyberattacks are only less shocking nowadays because they've grown more commonplace.

...
Read More

The last thing cybersecurity experts want: A 'Skeleton Key' for hackers

By RDBAE Press on Jan 13

Imagine giving a skeleton key to your databases to a cybercriminal - obviously a situation everybody would like to avoid.

...
Read More
...
Read More

The reasons behind nation-state hackers

By RDBAE Press on Jan 08

There are the archetypal teenage hackers who advance their reputations by accessing restricted networks just for the thrill of it, and then there are cyberespionage masters who target the databases of nationwide financial enterprises and public entities. 

...
Read More

How an employee mishap can reveal database login credentials

By RDBAE Press on Jan 08

Sometimes, the most grievous data breaches are not incited by sophisticated cybercriminals using the latest hacking techniques, but everyday employees who ignore basic protocols. 

...
Read More

5 Linux distributions for servers

By RDBAE Press on Jan 07

When a professional says he or she specializes in Linux operating systems, some may be cheeky enough to ask "which one?"

...
Read More

Is Oracle going mobile?

By RDBAE Press on Jan 05

Factoring a mobile workforce into a business's enterprise application infrastructure is a consideration many CIOs are making nowadays.

...
Read More

​Be sure to Choose
the Right Provider
Download our free guide

Important
Questions to Ask

when choosing a
Remote DBA Provider
This simple .pdf will help ensure you efficiently evaluate remote DBA companies
Download NOW!