Minding the database: Interview with Phil Neray, IBM

A host of high-profile breaches have defined 2011, from HBGary to Epsilon to Sony to RSA to Lockheed Martin. The motives for each attack have been different, but they all share something in common: The perpetrators wanted access to the database, where the company's crown jewels lie. Phil Neray, vice president of data security strategy at IBM, discusses why organizations must implement protections at the database level to both catch the adversaries in action and trace their footsteps for the forensic investigation.

Sign up to our newsletters

More in Videos

Video: Privileged access in the enterprise

In this video, Leonid Shtilman, CEO at Viewfinity, sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

Video: Corporations defending IT infrastructure

John McClurg, vice president of Dell Global Security, discusses some of the threats posed to corporations today, and how security professionals should assess them in order to implement successful security strategies.

Video: Impacts of the executive order

Ahren S. Tryon, attorney at Cozen O'Connor, discusses the recent executive order, as well as the concerns of privacy in relation to information sharing between the public and private sector.