Author: Eyal Kalderon
-
The State of Database Security: An Interview with Blue Core Research CTO
In an exclusive interview, we spoke with Eyal Kalderon, Founder and CTO of Blue Core Research, to gain insight into the current state of database security. Eyal, you have been working with advanced database technologies for over 30 years and focusing on database security for the past two decades. You have several patents and have…
-
The Mystery of the Missing Sparkle-Bits
Lessons Learned Aella’s adventure is a perfect example of good data security practices. If you can replicate her example, you will likely avoid a data breach. Let’s break it down into key takeaways and how you can mirror this fictional story in real life. The Security Event One day, Aella, guardian of the Sparkle-Bits, noticed…
-
Think Twice: Is Database Security Really a Luxury You Can’t Afford?
We get it. When budgets are tight and threat landscapes seem to expand daily, the siren song of “good enough” security can be tempting. Perimeter defenses, endpoint protection – they feel tangible, like walls around your digital kingdom. Database security? Often perceived as complex, costly, and… well, another thing on the ever-growing list. But what…
-
Solving Data Theft and Privacy Protection
Data breaches are a regular occurrence. Most people had their emails or phone numbers stolen. That should be a shocking reality, but the scale of the problem and the frequent breaches have normalized it into something everyone accepts and mostly ignores. Data theft remains one of the most persistent and damaging problems in information security.…
-
Why the “Not That Sensitive” Argument Crumbles Under Scrutiny
Let’s be blunt: the mindset that “our data isn’t that sensitive” is a dangerous delusion. It’s a blind spot that leaves organizations vulnerable and undermines the very purpose of collecting and storing information in the first place. We need to shift the paradigm. All data is sensitive. It’s not just about Social Security numbers, credit…
-
The Silent Majority: Why Database Threats Must Become Center Stage
As security professionals, we are constantly bombarded with threats. The news cycles are filled with tales of sophisticated phishing campaigns, novel malware strains, and the ever-evolving tactics of network intruders. We diligently patch our endpoints, implement robust firewalls, and train our users to be wary of social engineering ploys. These are vital defenses, the frontline…
-
The Illusion of the Wall: Why Your Data Fortress is a Sandcastle
For years, the mantra of cybersecurity echoed the “perimeter.” Firewalls stood tall like digital Hadrian’s Walls, antivirus software patrolled the gates, and email filters acted as vigilant sentries. This approach focused on keeping the “bad guys” out and offered a tangible sense of security. We could see the defenses, watch them in action, and feel a semblance…
-
What you are doing is not working
A survey from Rubrik Zero Labs reveals that 90% of IT and security leaders experienced cyberattacks in the past year, and 20% reported an attack every other week on average. Those are merely attacks, but attacks have consequences. 30% reported on-premise data breaches, 28% a cloud or SaaS breach, and 26% reported ransomware. And the…
-
Introduction to Databases for Security Professionals
What is a Database? A database is a software solution that stores, manipulates, and retrieves data. Think of an Excel spreadsheet, but a database operates on a much larger scale. A database is like thousands of Excel spreadsheets, some with millions of rows, accessed simultaneously by thousands of individuals. To be accurate, that is a…
-
Tracking Data Changes and Compliance Requirements for Financial Institutions
Tracking data changes is a cornerstone of good recordkeeping and data integrity. In the highly regulated world of banking and financial institutions, the ability to accurately track and reconstruct changes to data is not merely a best practice but a fundamental regulatory requirement. Financial institutions handle customer information and transactional data, where even a minor,…