ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • The Changing Face of Global Data Privacy: GDPR, CCPA, and Beyond

    Sponsored by: MongoDB, Inc.

    For companies that collect user data, the GDPR was just the beginning of a regulatory onslaught; the CCPA signifies a start of a wave of similar legislation across another country, with more to follow. Check out this white paper to learn how you can map privacy controls to databases and meet data privacy requirements with MongoDB.

  • Scale Your Startup with MongoDB

    Sponsored by: MongoDB, Inc.

    In this webcast, MongoDB Director Mike Lynn introduces MongoDB Atlas, their global database service which can simplify database scaling with the cloud in just a few clicks. Tune in to learn how to add users, manage access, and more.

  • Kingminer –a Crypto-Jacking Botnet Under the Scope

    Sponsored by: Bitdefender

    Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.

  • How Modern DevOps Teams Use MongoDB Atlas to Enhance Productivity

    Sponsored by: MongoDB, Inc.

    DevOps has been a blessing for developers and companies ever since it burst onto the scene in 2008, but its use isn’t only limited to application development. Check out this white paper to learn how MongoDB is designed to integrate with DevOps teams and processes, guaranteeing high availability and unprecedented database visibility.

  • Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign

    Sponsored by: Bitdefender

    Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

  • Multiple Heterogeneous Databases Migrations

    Sponsored by: IO Connect Services

    Many businesses are looking to take advantage of the benefits of the cloud by migrating their databases there; a top destination for these databases is AWS. Check out this case study to learn how Brightfield migrated multiple databases to AWS and cut their DB operating costs in half even as they expanded capacity.

  • Continuous Replication of Data in a Heterogeneous Database Migration

    Sponsored by: IO Connect Services

    SaaS providers like Brightfield, who provide an augmented analytics service, often find their database licensing costs unsustainable. As a result, many of these businesses are migrating their databases to AWS. Check out this case study to learn how Brightfield managed to migrate to AWS without having to incur significant downtime.

  • Protecting Sensitive Data in and Around an Oracle Database

    Sponsored by: Thales

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • How to Implement a Strong COVID-19 Cybersecurity Plan

    Sponsored by: SearchSecurity.com

    Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.

  • Integrated, Broad Protection for Industrial Control Systems

    Sponsored by: Fortinet, Inc.

    As the cost of a data breach continues to skyrocket, failures to operational technology (OT) systems are no longer an option for today’s plant operations and manufacturing leaders. Download this solution brief for a closer look at Fortinet Security Fabric, designed to provide automated, well-orchestrate threat detection and response.

  • Europe's controversial digital vision for the next decade

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.

  • Db2: The AI Database

    Sponsored by: IBM

    Db2 is powered by AI and built for AI. This eBook explores what that means with an in depth look at the technologies supporting it.

  • Accelerating AI with Data Management

    Sponsored by: IBM

    View the results of 451 Research's Voice of the Enterprise: AI & Machine Learning survey here, which explains why 33% of respondents cited accessing and preparing data as a barrier the use of machine learning.

  • Accelerating AI with Data Management

    Sponsored by: IBM

    View the results of 451 Research's Voice of the Enterprise: AI & Machine Learning survey here, which explains why 33% of respondents cited accessing and preparing data as a barrier the use of machine learning.

  • Automatic Whole Database Encryption – How It Works

    Sponsored by: NetLib Security

    In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.

  • Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector

    Sponsored by: NetLib Security

    In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.

  • Encrypt Everything

    Sponsored by: Thales

    Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Sponsored by: Thales

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Thales

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

  • The Changing Role of the DBA: Machine Learning for DBAs

    Sponsored by: Oracle and Intel®

    In this webcast, Charlie Berger, Sr. Director of Product Management at Oracle, investigates the changing role of the DBA. Tune in to hear him present 6 steps with which you can evolve from database developer to data scientist and confront common machine learning obstacles and how to overcome them.

  • Multitenancy Options in Postgres

    Sponsored by: EnterpriseDB

    This white paper will show you the different ways that Postgres can help you achieve a multitenant database architecture. Download now for a complete architectural overview and to view these 3 multitenancy options at your disposal.

  • Disaster Recovery Planning Ahead

    Sponsored by: OffSiteDataSync and Veeam

    A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.

  • Dremio Security Architecture Guide

    Sponsored by: Dremio

    Because data sets and analytics systems are valuable targets for cybercriminals, it is important that your data access and analysis systems provide a variety of security options so that you can protect your organization’s data from potential threats. Read the attached guide to see some security choices that the data lake engine Dremio offers.

  • Cloud Data Management Adapts to Soaring Volumes—Don’t Get Left Behind

    Sponsored by: Cirrus Data Solutions

    As cloud use cases and data volumes expand, vendors are now responding with their own cloud data management solutions. Read this e-guide to get an update on the current state of cloud data management, about a comparison of tape versus cloud storage, and an exclusive look at the cloud data extraction process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.