Two
factors have contributed significantly to this escalation: First,
organizations are being asked to grant increased access to data
stored in the database. This additional access dramatically increases
the potential for theft and abuse. Those that require access to data
include internal employees, auditors, contractors, subcontractors,
and supply chain partners. Secondly, database attackers have
changed. In the past, people hacked into networks to “prove they
could.” While those attacks were malicious, they seldom resulted in
data theft.