John, for many enterprises, the "crown jewels" are found in their database applications - virtual “crown jewels” of data in traditional database applications that are often linked to the Internet. What are the chief threats to today's databases? How can you prevent your organization from attacks where cybercriminals are looking for data to steal and databases to delete? What are the core principles of database security, and what should your security team be doing to prevent new attacks from cracking your critical data?