Eight Key Steps to Protecting Structured Data

Thursday Mar 20th 2008 by DatabaseJournal.com Staff

New automated tools that monitor databases can save a company's IP -- perhaps even its very existence.

[From eWeek]

The security world winces when it is reminded of the horror story of the TJX Inc. data breach, the largest such incident to date in IT history.

In that March 2007 event, more than 45.6 million credit card, debit card, social security, drivers' license and military identification numbers were stolen from the company's central database, breaking the old data breach record of 40 million records, previously "set" in 2005 by CardSystems Inc.

The article continues at http://www.eweek.com/c/a/Security/Eight-Key-Steps-to-Protecting-Structured-Data/

Mobile Site | Full Site