Minding the database: Interview with Phil Neray, IBM

A host of high-profile breaches have defined 2011, from HBGary to Epsilon to Sony to RSA to Lockheed Martin. The motives for each attack have been different, but they all share something in common: The perpetrators wanted access to the database, where the company's crown jewels lie. Phil Neray, vice president of data security strategy at IBM, discusses why organizations must implement protections at the database level to both catch the adversaries in action and trace their footsteps for the forensic investigation.

More in Videos

Video: The continued rise of DDoS

In this video, Ashley Stephenson, CEO at Corero Network Security, discusses the development of DDoS attacks, as well as how security professionals can grapple with the challenges the threat poses.

Video: The risks surrounding digital certificates

In this video, Jeff Hudson, CEO at Venafi, discusses the importance of digital certificates, as well as the threats surrounding forged ones should they be used in an attack against an organization.

Video: The challenges third-parties pose for SMBs

In this video, Marcos Colón, digital content coordinator at SC Magazine, sits with Charles Henderson, director of SpiderLabs at Trustwave, to discuss the growing challenges that SMBs face with third-parties that may put an organization's data at risk.