Contact Us

Author: Eyal Kalderon

  • Database Security Technology: Don’t Stay Behind the Curve

    Database Security Technology: Don’t Stay Behind the Curve

    We spend millions on firewalls and EDR protecting the perimeter and endpoints. But the actual prize, your data, often sits in a vault protected by a 25-year-old padlock. Our information is what attackers are after, yet it is what we protect the least. In a house made of doors, we obsess over the doors, neglecting…

  • Finding Sensitive Data for Free Using AI

    Finding Sensitive Data for Free Using AI

    The Challenge: What Data Do I Have? Most organizations face a critical compliance and security roadblock: they don’t actually know where their sensitive data lives. However, with the advent of AI, you can now easily scan through an entire database schema in a few minutes or less. The security roadblock: Locating sensitive information is an…

  • Masking Poll

    Masking Poll

    In a recent survey, we asked cybersecurity professionals if they mask their data. The results were unsurprising. 90% of respondents said data masking is important. 40% already mask their data, and nearly 50% need to mask it but haven’t yet. Only 10% don’t consider data masking important. For companies that need to mask their data,…

  • Database Security Spending Guidelines

    Database Security Spending Guidelines

    It’s not trivial to find the “correct” investment level for database security. Unlike antivirus, it’s not a simple comparison between multiple vendors. The pricing models don’t align, the features are very intricate, and comparison is impossible. To make things worse, we rarely know exactly what we need. This article aims to give you guidance, so…

  • Database Activity Control: The State of the Market

    Database Activity Control: The State of the Market

    We recently conducted a poll to check the state of the database security market, focusing on activity control. The results offer a fascinating glimpse into the mindset of security professionals. Let’s start with the unequivocally good news: every single respondent believes it is vital to control database activity. Everyone agrees. In an industry often divided…

  • Database Evaluation Checklist

    Database Evaluation Checklist

    Organizations depend on data, and databases are where that data lives. Databases are the heart that pumps this data throughout your organization and keeps it alive. But data volumes soar, regulations tighten, and treating database security as a collection of isolated technical tasks is a recipe for disaster. Yet, many companies still treat database security…

  • Cybersecurity Budgets and What They Mean

    Cybersecurity Budgets and What They Mean

    A recent poll by Blue Core Research shows an interesting pattern in cybersecurity budgets. About half of the companies (47%) increased their cybersecurity budget, while the other half had a negative trend. Within the negative trend, about a quarter had no changes in their budget, half had some decrease, and the last quarter had a…

  • Database Security: Whose job is it?

    Database Security: Whose job is it?

    Database security often feels like a shadowy corner of IT, requiring arcane knowledge that many security teams feel ill-equipped to handle. The question of “Whose job is it?” and “How do we even begin?” loom large, sometimes leading to a sense of paralysis. The analogy of the fox guarding the hens perfectly captures the understandable…

  • Data Masking, Anonymization, Obfuscation, and Privacy – Methods and Examples

    Data Masking, Anonymization, Obfuscation, and Privacy – Methods and Examples

    In a world driven by data with threats lurking around every corner, keeping data safe is nearly impossible. However, we then make this challenge worse by copying the data for testing, development, training, and more. If protecting data in production is difficult, protecting these copies outside of the secured production environment is impossible. So, what…

  • The State of Database Security: An Interview with Blue Core Research CTO

    The State of Database Security: An Interview with Blue Core Research CTO

    In an exclusive interview, we spoke with Eyal Kalderon, Founder and CTO of Blue Core Research, to gain insight into the current state of database security. Eyal, you have been working with advanced database technologies for over 30 years and focusing on database security for the past two decades. You have several patents and have…