Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities

Cover

The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. Background information, general risk mitigation strategies, and Imperva's SecureSphere Database Security Gateway protections are provided for each threat.

Author

Amichai Shulman Co-Founder, CTO, Imperva Amichai Shulman is co-founder and CTO of Imperva, where he heads the Application Defense Center (ADC), Imperva’s internationally recognized research organization focused on security and compliance. Mr. Shulman regularly lectures at trade conferences and delivers monthly eSeminars. The press draws on Mr. Shulman’s expertise to comment on breaking news, including security breaches, mitigation techniques, and related technologies. Under his direction, the ADC has been credited with the discovery of serious vulnerabilities in commercial Web application and database products, including Oracle, IBM, and Microsoft. Prior to Imperva, Mr. Shulman was founder and CTO of Edvice Security Services Ltd., a consulting group that provided application and database security services to major financial institutions, including Web and database penetration testing and security strategy, design and implementation. Mr. Shulman served in the Israel Defense Forces, where he led a team that identified new computer attack and defense techniques. He has B.Sc and Masters Degrees in Computer Science from the Technion, Israel Institute of Technology.
Vendor:
Imperva.
Posted:
29 Nov 2013
Published
08 Oct 2008
Format:
PDF
Length:
12 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy