Security News
The vast majority of IT professionals admit that they manage different versions of the same database, and 74.4% run into issues with their current data warehouses, according to a survey conducted by Propeller Insights. More than half of those surveyed said that hiring and retaining IT professionals to manage their databases is the biggest database-related challenge their organizations face, and more than a third said that they plan to replace their current database solution in the next quarter or two.
They can also copy the entire database - including files that contain many of the corporate crown jewels. There are a variety of technologies for database encryption.
Nearly three quarters of organizations have now adopted DevOps in some form, cross-platform database use has risen markedly and, significantly, IT teams have remained remarkably productive despite working remotely. "It helped to accelerate our understanding of the ways IT teams can cooperate and continue to develop applications and databases when taking a remote-first approach. That, in turn, has accelerated further the take-up of DevOps, the use of multiple database platforms for different use cases, and the move to the cloud."
Confluent announced Confluent's Premium Connector for Oracle Change Data Capture Source, a bridge for one of the most common and critical sources of enterprise data to connect to Apache Kafka. As the first in a series of Premium Connectors, Confluent makes integrations with complex, high-value systems seamless, reliable, and cost-effective to establish a continuously flowing stream of data that powers the business.
Researchers say they found several stolen and leaked credentials for a Florida water-treatment plant, which was hacked last week. Researchers at CyberNews said they found 11 credential pairs linked to the Oldsmar water plant, in a 2017 compilation of stolen breach credentials.
The newest iteration of Yugabyte's open source database improves on the existing high availability, horizontal scalability, and ease-of-use characteristics of YugabyteDB, furthering the company's mission of providing the default distributed SQL database for cloud-native applications in a multi-cloud world. The release of YugabyteDB 2.4 stabilizes the features and capabilities included in the YugabyteDB 2.3 development release.
Hands On. Google has big ambitions for its new Open Source Vulnerabilities database, but getting started requires a Google Cloud Platform account and there are other obstacles that may add friction to adoption. The company wants to see more discipline and checks in critical open-source software, and revealed that it maintains its own private repositories for many projects to guard against compromised code or newly committed vulnerabilities.
Google last week announced the launch of OSV, which the internet giant has described as a vulnerability database and triage infrastructure for open source projects. OSV should make it easier for the users of open source software to find out which vulnerabilities impact them.
Oxfam Australia investigates a suspected data breach after a threat actor claimed to be selling their database belonging on a hacker forum. Last week, BleepingComputer learned of a threat actor claiming to be selling a database containing the Oxfam Australia contact and donor information for 1.7 million people.
Bonobos men's clothing store has suffered a massive data breach exposing millions of customers' personal information after a cloud backup of their database was downloaded by a threat actor. Bonobos started as an online men's clothing store but later expanded to sixty locations to try on clothes before purchasing them.