Database Journal
MS SQL Oracle DB2 Access MySQL PostgreSQL Sybase PHP SQL Etc SQL Scripts & Samples Links Database Forum

» Database Journal Home
» Database Articles
» Database Tutorials
MS Access
Database Tools
SQL Scripts & Samples
» Database Forum
» Sitemap
Free Newsletters:
News Via RSS Feed

follow us on Twitter
Database Journal |DBA Support |SQLCourse |SQLCourse2

Posted Jan 10, 2011

Database Security May Take Second Chair to Unstructured Content

By Staff

As hackers continue to seek loopholes into corporate data, the focus from structured data, such as database records, may switch to unstructured data in the form of files (word documents, spreadsheets, presentations, transcripts, lab reports, etc.). Imperva’s Asia-Pacific vice president Stree Naidu said that "While most business applications use structured storage such as databases to maintain and process sensitive and critical data, users are constantly creating and storing more unstructured content, based on the information taken from these systems,"; further stating that information is accessible by just too many people that do not have a legitimate need for that information. Because of this, companies should take note and begin to think about the next generation of file access monitoring and governance tools needed to reduce exposure.
View Article

Daily News Archives

Comment and Contribute


(Maximum characters: 1200). You have characters left.