Contact Us

Author: Eyal Kalderon

  • The Enemy Within: Why the “Trusted” Can Be Your Biggest Nightmare

    The Enemy Within: Why the “Trusted” Can Be Your Biggest Nightmare

    As security professionals, we are wired to look outward. The flashing red lights, the ominous port scans, the whispers of sophisticated APTs – these are the narratives that grab our attention. We build digital fortresses, moats of firewalls, and sentry towers of intrusion detection systems, all pointing toward a faceless external adversary. And why wouldn’t…

  • Database Security: From Threats to Solutions

    Database Security: From Threats to Solutions

    Why is Database Security So Critical? A serious data breach means someone got into your database and stole data. Databases are the gatekeepers of your data, and anyone who wants to get it must get it from the database. While you should protect all infrastructure components, none is more important than the database. Regardless of…

  • Beyond the Black Box: Your database security matters more than you think

    Beyond the Black Box: Your database security matters more than you think

    Let’s be honest. For many outside the dedicated database teams, those servers humming away in the data center feel like mysterious black boxes. They hold critical information, the lifeblood of your organization, yet their inner workings often remain shrouded in inexplicable technical jargon. This lack of visibility can breed a dangerous assumption: a belief that…

  • Beyond the Application Walls: Why Database Security Demands Your Belief and Action

    Beyond the Application Walls: Why Database Security Demands Your Belief and Action

    We, as security professionals, operate in a realm of logic, risk assessment, and proactive defense. We preach the layered security model, the principle of least privilege, and the importance of defense in depth. Yet, there’s a persistent, almost baffling, undercurrent in our field: the belief that application-level security is the ultimate bastion, a shield sufficient…

  • PCI-DSS in SQL Server and Oracle and Databases

    PCI-DSS in SQL Server and Oracle and Databases

    Introduction PCI-DSS is a security standard published by credit card companies (PCI is the Payment Card Industry, and DSS stands for Data Security Standard). It is a mandatory requirement for anyone processing credit cards. PCI-DSS version 4.0.1 is an almost 400-page document, so this article isn’t replacing it. But we help translate PCI-DSS to practical…

  • How to audit an Oracle database?

    How to audit an Oracle database?

    Introduction Oracle auditing is a large, complex, and confusing subject with many technology options. We aim to demystify those and help you make educated technology choices, guiding you to a solution that works for you. From capturing data to getting value from it and from a DIY to high-end solutions, let’s explore Oracle auditing. Capture…

  • How to audit a SQL Server database?

    How to audit a SQL Server database?

    Introduction SQL Server auditing is a large and complex subject with many technology options. We aim to demystify those and help you make educated technology choices, guiding you to a solution that works for you. From capturing data to getting value from it and from a DIY to high-end solutions, let’s explore the world of…

  • Choosing the Data Masking Solution that’s Right for You

    Choosing the Data Masking Solution that’s Right for You

    Introduction In today’s data-driven world, privacy and security are more crucial than ever before. Data masking solutions help protect personal, financial, and business-critical information. Selecting the right solution is essential to a successful masking project and effective protection of your sensitive information. Misleading Terminology Many vendors use terms like Anonymization, Pseudonymization, Tokenization, Hashing, Encryption, Reduction,…

  • Database Auditing and IDS: A Comprehensive Guide to Data Protection

    Database Auditing and IDS: A Comprehensive Guide to Data Protection

    Introduction Modern businesses run on data. From customer data to financial information and beyond, databases store plenty of sensitive information. This data enables company operations and drives decision-making. However, this reliance on data exposes organizations to significant risks. Cyberattacks and data breaches can compromise sensitive information, leading to financial loss, regulatory penalties, lawsuits, and irreparable…

  • Webinar: Successful Data Masking – problems and solutions

    Webinar: Successful Data Masking – problems and solutions

    Webinar: How to succeed in data masking Are you worried about successfully deploying a data masking solution? If you’re thinking about starting a data masking project or tried to mask and failed, we can help. Let us show you what to look for and how to overcome these obstacles. Join our free webinar and discover…