Feeds

Look what they've done to my database, Ma

Developers guard against Net breaches

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

One in 10 corporate databases connected to the Internet had a breach of security last year.

That's the main finding from a survey of 750 US database developers which also reveals growing concern about security issues.

Opening up databases to the Internet has become a top priority for big business, but this is accompanied by greater exposure to malicious viruses and unauthorised hackers.

More than two-thirds of the respondents to the survey conducted by market research firm Evans Data Corporation say that their most important development task over the coming year is the ability to provide dynamic Web access to their databases. Among other trends identified are increased use of Windows 2000 as a development platform (42 per cent use it compared to 21 per cent a year ago).

There's also greater development of mobile database applications (44 per cent up from 36 per cent last year), which in itself justifies heightened security concern. Mobile networks open up new avenues of attack for attackers, as evidenced by well-publicised flaws in the security of wireless LANs and WAP Gateways.

While most developers surveyed have beefed up the security of their network infrastructures, much fewer
take advantage of built-in database security features.

"Many people are focused on the security of their networks and operating systems. However, little attention is given to actual database security," said Joe McKendrick, an analyst at Evans Data. "The results of this survey illustrate the importance of security in the database as well as the surrounding network."

The survey reveals wide variations in security incidents by industry. More than one in four developers in financial services reported incidences of unauthorised access and data corruption to their information. Eighteen per cent of respondents in the healthcare and telecommunications industries reported breaches. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.