Categories
Products
Technologies
Top Rated docs

January 4, 2021

Importing or Changing Your SSL Certificate in ClusterControl

SSL encryption is clearly one of the must-haves for database deployments. It is required by all security standards and even if your organization does not have to comply with PCI DSS, HIPPA or other similar...

November 27, 2020

How to Secure MySQL: Part Two

In the previous post about MySQL security, we have covered a range of options that can be used to make your MySQL instance(s) more secure. They included: General MySQL security measures; Controlling access in MySQL;...

November 20, 2020

How to Secure MySQL: Part One

Whenever application security is mentioned, people think of securing applications against some of the most frequent attacks such as injection, broken authentication, sensitive data exposure, and the like. However, while these attacks are prevalent, knowing...

September 29, 2020

ClusterControl’s Vault Integration Adds Dynamic Data Security Protections

The security is paramount nowadays, especially for the organizations that deal with the sensitive data - financial, health, personal data. In those cases you are obliged to comply with numerous security and data protection standards...

July 14, 2020

Using the MariaDB Audit Plugin for Database Security

There are different ways to keep your data safe. Practices such as controlling database access, securing configuration, upgrading your system, and more are part of database security. It is even possible that you have security...

April 28, 2020

Using SSH Tunneling as a VPN Alternative

Using a VPN connection is the most secure way to access a network if you are working remotely, but as this configuration could require hardware, time, and knowledge, you should probably want to know alternatives...

April 7, 2020

My DBA is Sick – Database Security Tips for SysAdmins

The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...

February 26, 2020

How to Protect Your MySQL & MariaDB Database Against Cyberattacks When on a Public Network

It is sometimes inevitable to run MySQL database servers on a public or exposed network. This is a common setup in a shared hosting environment, where a server is configured with multiple services and often...

February 10, 2020

How to Protect your MySQL or MariaDB Database From SQL Injection: Part One

Security is one of the most important elements of the properly designed database environment. There are numerous attack vectors used with SQL injection being probably the most popular one. You can design layers of defence...

February 5, 2020

Is My Database Vulnerable to Attack? A Security Checklist

Data is probably the most important asset in a company, so you should make sure your database is secured to avoid any possible data theft. It’s hard to create an environment that is 100% secure,...

January 10, 2020

A SOx Compliance Checklist for PostgreSQL

The United States SOx (Sarbanes-Oxley) Act, 2002, addresses a broad spectrum of fundamental information security principles for commercial enterprises, ensuring their functions are rooted and consistently applied, based on concepts of CIA (Confidentiality, Integrity, and...

January 2, 2020

Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part Two

In the first part of this series, we have covered in-transit encryption configuration for MariaDB replication servers, where we configured client-server and replication encryptions. Taken from the first post, where we had partially configured our...

Subscribe below to be notified of fresh posts