First MegaUpload, now Mega {3}

by Eric C
As many people have heard by now, MegaUpload was seized by the FBI for copyright infringement and the clever designer behind it, Kim Dotcom, announced he will be opening up a new digital storage site simply called Mega. The main difference for Mega is the ability for users to encrypt right when anybody uploads files from their web browser. Using Advanced Encryption Standard (AES), nobody but the original uploader will be able to access the files. The decryption key is stored with the user whenever he/she needs to access their files and it was made clear Mega will not have access to these decryption keys. As a result, this will prevent any prying eyes from knowing what the contents of a user’s files are. Not only that, but Mega will store all customers’ data onto two different servers located in different countries. Each server will have the ability to have identical copies and work in real time. However, the article did not specify what kind of database technology will be used for the new servers and how the new server will work in terms of making redundant copies from across the world. read more...

Database Security and McAfee {1}

by Daniel L
The number of databases getting hacked or compromised keeps going up, but the question is, are there any counter-measures being used against these database breaches?  The answer to this question lies in the approach to database security McAfee has taken, providing businesses with protective countermeasures capable of thwarting the influx of potentially harmful intrusions.  McAfee offers businesses protection of data in every state, whether it is at rest or in use, through the combination of network and server security, along with encryption and file permission controls.  It is understood that safeguarding databases is one of the most difficult things to do, and this is where McAfee is trying to make a difference through their offerings.  The security solutions that McAfee offers include database discovery and assessment, protection of data, database management tools, and activity monitors.  First and foremost, information about all the databases belonging to an organization are collected, which ultimately determines if security patches have been properly deployed and installed, scanning for any possible vulnerabilities along the way.  Furthermore, McAfee ensures that critical data will be protected through the use of a firewall along with access restrictions of the users or applications with insufficient permissions.  Real time monitoring alerts are also used to warn database administrators of a possible intrusion attempt, giving them the ability to terminate sessions accordingly. read more...