Author: Eyal Kalderon
-

Database Security Technology: Don’t Stay Behind the Curve
We spend millions on firewalls and EDR protecting the perimeter and endpoints. But the actual prize, your data, often sits in a vault protected by a 25-year-old padlock. Our information is what attackers are after, yet it is what we protect the least. In a house made of doors, we obsess over the doors, neglecting…
-

Finding Sensitive Data for Free Using AI
The Challenge: What Data Do I Have? Most organizations face a critical compliance and security roadblock: they don’t actually know where their sensitive data lives. However, with the advent of AI, you can now easily scan through an entire database schema in a few minutes or less. The security roadblock: Locating sensitive information is an…
-

Masking Poll
In a recent survey, we asked cybersecurity professionals if they mask their data. The results were unsurprising. 90% of respondents said data masking is important. 40% already mask their data, and nearly 50% need to mask it but haven’t yet. Only 10% don’t consider data masking important. For companies that need to mask their data,…
-

Database Security Spending Guidelines
It’s not trivial to find the “correct” investment level for database security. Unlike antivirus, it’s not a simple comparison between multiple vendors. The pricing models don’t align, the features are very intricate, and comparison is impossible. To make things worse, we rarely know exactly what we need. This article aims to give you guidance, so…
-

Database Activity Control: The State of the Market
We recently conducted a poll to check the state of the database security market, focusing on activity control. The results offer a fascinating glimpse into the mindset of security professionals. Let’s start with the unequivocally good news: every single respondent believes it is vital to control database activity. Everyone agrees. In an industry often divided…
-

Database Evaluation Checklist
Organizations depend on data, and databases are where that data lives. Databases are the heart that pumps this data throughout your organization and keeps it alive. But data volumes soar, regulations tighten, and treating database security as a collection of isolated technical tasks is a recipe for disaster. Yet, many companies still treat database security…
-

Cybersecurity Budgets and What They Mean
A recent poll by Blue Core Research shows an interesting pattern in cybersecurity budgets. About half of the companies (47%) increased their cybersecurity budget, while the other half had a negative trend. Within the negative trend, about a quarter had no changes in their budget, half had some decrease, and the last quarter had a…
-

Database Security: Whose job is it?
Database security often feels like a shadowy corner of IT, requiring arcane knowledge that many security teams feel ill-equipped to handle. The question of “Whose job is it?” and “How do we even begin?” loom large, sometimes leading to a sense of paralysis. The analogy of the fox guarding the hens perfectly captures the understandable…
-

Data Masking, Anonymization, Obfuscation, and Privacy – Methods and Examples
In a world driven by data with threats lurking around every corner, keeping data safe is nearly impossible. However, we then make this challenge worse by copying the data for testing, development, training, and more. If protecting data in production is difficult, protecting these copies outside of the secured production environment is impossible. So, what…
-

The State of Database Security: An Interview with Blue Core Research CTO
In an exclusive interview, we spoke with Eyal Kalderon, Founder and CTO of Blue Core Research, to gain insight into the current state of database security. Eyal, you have been working with advanced database technologies for over 30 years and focusing on database security for the past two decades. You have several patents and have…