Hi, welcome to RDX! The PostgreSQL Global Development Group recently unveiled PostgreSQL 9.4. The open source community maintains this iteration reinforces the group's three core values: flexibility, scalability and performance.
Hi, welcome to RDX! If you didn't catch President Obama's State of the Union address, cybersecurity was a serious topic of discussion. To improve the United States' ability to combat cybercriminals, Obama made two recommendations.
Cloud migration tools, hybrid cloud compatibility features and analytics capabilities are just a few of the accommodations database administrators are favoring nowadays. Throughout 2014, Microsoft made a number of revisions to its signature database engine SQL Server, which is a solution of choice among many DBA experts.
Companies using Oracle's database engine to support their enterprise application and information storage needs should consider consulting Oracle experts to help them patch a bug that could allow infiltrators to completely take over their systems.
This is the third article of a series that focuses on database security. In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments. In last month’s article, we began with a review of the various database vulnerabilities and threat vectors we need to address. In this article we’ll finish our discussion of the most common threats and vulnerabilities. In the next installment of this series, we’ll take a look at the database vulnerability analysis process. We’ll begin by learning how to perform an initial database vulnerability assessment. In addition, we’ll discuss the importance of performing assessments on a regular basis to ensure that no new security vulnerabilities are introduced into our environment.
Imagine giving a skeleton key to your databases to a cybercriminal - obviously a situation everybody would like to avoid.
There are the archetypal teenage hackers who advance their reputations by accessing restricted networks just for the thrill of it, and then there are cyberespionage masters who target the databases of nationwide financial enterprises and public entities.
Sometimes, the most grievous data breaches are not incited by sophisticated cybercriminals using the latest hacking techniques, but everyday employees who ignore basic protocols.