Loading...

Follow DataSunrise on Feedspot

Continue with Google
Continue with Facebook
or

Valid
One more time about strengthening your database security or how you can intensify authorization to the restricted DBMS. Two-factor authentication (2FA) validates database users’ identities by two separate identifiers. Authentication to access the database is not performed until both identification methods input by the user are correct. Generally speaking, an access to any system may […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Please take a look at the biggest database security incidents in August 2018. Largest Hotel Chain Hacked in China The August of 2018 has seen a massive data breach of customer personal information from a chain of 13 hotels operated by Huanzhu Hotels Group. This incident is believed to be largest in China in five […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Please take a look at the biggest database security incidents in June 2018. Typeform Typeform is a well-known software-as-a-service company located in Spain. The company helps to carry out online surveys by providing different online forms. However, the company suffered its database breach. All this resulted in the fact that all the information collected by […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Please take a look at the database security news in May 2108. Major Breakthrough in Personal Data Protection – Introduction of GDPR The General Data Protection Regulation was introduced on May 25th, 2018 in the European Union. Recent years have seen massive data breaches affecting hundreds of millions of people. So, it’s no wonder that […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The main principle of any firewall operation is to analyze network traffic in order to accept or reject the connections and the services according to a set of rules. Thus, only authorized traffic defined by the local security policy will be allowed to pass. In the meantime, a firewall cannot protect against the attacks that […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

MySQL databases don’t contain a build-in mechanism to support the Active Directory (AD) authorization. However, it is possible to configure AD authorization using third-party plugins and modules, with some restrictions. Such solutions are not available for all MySQL versions and usually complex in implementation and maintenance. This article explains how AD authorization could be easily […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
DataSunrise Compliance Manager – DDRC DataSunrise is making complicated things easier. Recent years have seen massive data breaches affecting hundreds of millions of people. So, it’s no wonder that legislators are making data protection requirements more stringent and introducing new regulations and requirements. Sometimes those regulations could be complicated for organizations that must comply with […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview