What makes a good unified database security solution?
by Mirko Zorz - Tuesday, 19 June 2012.
The rise of hacktivism that went beyond defacing websites and concentrated on stealing information and leaking it has made it clear that most attackers go right for the databases - no matter their nature.

In this podcast recorded at the RSA Conference 2012, David Maman, the founder and CTO of GreenSQL, talks about the need for unified database security solutions, and he explains the features required by these solutions that aim to give a clear and full picture of the situation to its users.

Press the play button below to listen to the podcast:



David Maman is a recognized international expert in computer security advising companies on threat management, real-time network protection, advanced network design, and security architecture. He has founded a number of high-tech start-up companies, including Vanadium-Soft, Preacos, and Moksai. As a senior technology director for Fortinet, he provided consulting services to global businesses and opened new international regions.

He was the information security manager for Bezeq, a national telecommunications company, and the chief scientist at Ofek, a leading Israeli IT and security consulting firm. In addition to his bachelorís and masterís degrees in computer science, David confesses to being heavily self-taughtóa quality that has served him well in this highly dynamic industry.

Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //