At the risk of sounding biased, here are a couple of quotes from the SearchSecurity.com write-up that to me illustrate the differences in the approach of IBM and certain other database companies when it comes to fixing security vulnerabilities:
"The good news, Litchfield said, is that IBM has already addressed the flaws in versions 7.31.xD9, 9.40.xC8, or 10.00.xC4. Unlike his often strained exchanges with Oracle, Litchfield said IBM has been responsive."
"While the Informix problems have been addressed, Litchfield said they point to a larger issue: Database flaws are pervasive throughout the industry. He again used Oracle as an example, noting how the database giant has fixed more than 100 serious flaws but has yet to address another 400-plus vulnerabilities, which is the estimated number of unpatched flaws according to his work and that of other researchers."
A key lesson that NGSS often repeats is to make use of the existing security features available in your data server and operating system to restrict unauthorized access and hence minimize the opportunity for malicious use. For IDS look out for Jonathan Leffler's Paranoid DBA presentation and note the new Security chapter in the IDS 10.0 Administrators Guide.