Blue Core Research
Contact Us

Author: Eyal Kalderon

  • The Illusion of the Wall: Why Your Data Fortress is a Sandcastle

    The Illusion of the Wall: Why Your Data Fortress is a Sandcastle

    For years, the mantra of cybersecurity echoed the “perimeter.” Firewalls stood tall like digital Hadrian’s Walls, antivirus software patrolled the gates, and email filters acted as vigilant sentries. This approach focused on keeping the “bad guys” out and offered a tangible sense of security. We could see the defenses, watch them in action, and feel a semblance…

  • What you are doing is not working

    What you are doing is not working

    A survey from Rubrik Zero Labs reveals that 90% of IT and security leaders experienced cyberattacks in the past year, and 20% reported an attack every other week on average. Those are merely attacks, but attacks have consequences. 30% reported on-premise data breaches, 28% a cloud or SaaS breach, and 26% reported ransomware. And the…

  • Introduction to Databases for Security Professionals

    Introduction to Databases for Security Professionals

    What is a Database? A database is a software solution that stores, manipulates, and retrieves data. Think of an Excel spreadsheet, but a database operates on a much larger scale. A database is like thousands of Excel spreadsheets, some with millions of rows, accessed simultaneously by thousands of individuals. To be accurate, that is a…

  • Tracking Data Changes and Compliance Requirements for Financial Institutions

    Tracking Data Changes and Compliance Requirements for Financial Institutions

    Tracking data changes is a cornerstone of Record Keeping and Data Integrity. In the highly regulated world of banking and financial institutions, the ability to accurately track and reconstruct changes to data is not merely a best practice; it is a fundamental regulatory requirement. Financial institutions handle customer information and transactional data where even a…

  • Your Neglected Databases Are a Ticking Time Bomb

    Your Neglected Databases Are a Ticking Time Bomb

    We live in an era of relentless cyber threats. Headlines scream about ransomware attacks, data breaches, and sophisticated phishing campaigns. In response, organizations often scramble to bolster their perimeter defenses, upgrade endpoint security, and implement the latest network monitoring tools. While these measures are undoubtedly important, there’s a silent crisis brewing within the digital heart…

  • The Enemy Within: Why the “Trusted” Can Be Your Biggest Nightmare

    The Enemy Within: Why the “Trusted” Can Be Your Biggest Nightmare

    As security professionals, we are wired to look outward. The flashing red lights, the ominous port scans, the whispers of sophisticated APTs – these are the narratives that grab our attention. We build digital fortresses, moats of firewalls, and sentry towers of intrusion detection systems, all pointing toward a faceless external adversary. And why wouldn’t…

  • Database Security: From Threats to Solutions

    Database Security: From Threats to Solutions

    Why is Database Security So Critical? A serious data breach means someone got into your database and stole data. Databases are the gatekeepers of your data, and anyone who wants to get it must get it from the database. While you should protect all infrastructure components, none is more important than the database. Regardless of…

  • Beyond the Black Box: Your database security matters more than you think

    Beyond the Black Box: Your database security matters more than you think

    Let’s be honest. For many outside the dedicated database teams, those servers humming away in the data center feel like mysterious black boxes. They hold critical information, the lifeblood of your organization, yet their inner workings often remain shrouded in inexplicable technical jargon. This lack of visibility can breed a dangerous assumption: a belief that…

  • Beyond the Application Walls: Why Database Security Demands Your Belief and Action

    Beyond the Application Walls: Why Database Security Demands Your Belief and Action

    We, as security professionals, operate in a realm of logic, risk assessment, and proactive defense. We preach the layered security model, the principle of least privilege, and the importance of defense in depth. Yet, there’s a persistent, almost baffling, undercurrent in our field: the belief that application-level security is the ultimate bastion, a shield sufficient…

  • PCI-DSS in SQL Server and Oracle and Databases

    PCI-DSS in SQL Server and Oracle and Databases

    Introduction PCI-DSS is a security standard published by credit card companies (PCI is the Payment Card Industry, and DSS stands for Data Security Standard). It is a mandatory requirement for anyone processing credit cards. PCI-DSS version 4.0.1 is an almost 400-page document, so this article isn’t replacing it. But we help translate PCI-DSS to practical…