Categories
Products
Technologies
Top Rated docs

April 23, 2020

Tips for Managing MongoDB Remotely

Working remotely due to the Covid-19 pandemic means an increase in the importance of isolated infrastructures; more specifically ones that can only be accessed through an internal network, but in a way that authorized people...

April 16, 2020

GDPR and Database Backups

‘Right to be Forgotten’, Article 17 in the EU General Data Protection Regulation (GDPR) talks about how a data subject has the right to request to remove it from any system. The owner of the...

April 15, 2020

Setting up ClusterControl as a Bastion Host for your Database Servers

A bastion host is a gateway host between an inside network and an outside network. It is commonly used to access remote hosts sitting on a different network which has no direct connection between the...

April 13, 2020

My DBA is Sick – Database User Management Tips for SysAdmins

User management is one of the day-to-day tasks that are performed by database administrators. If your database administrator is not available and you have been appointed to perform his tasks, you may have been asked...

April 7, 2020

My DBA is Sick – Database Security Tips for SysAdmins

The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...

March 20, 2020

Multi-DC PostgreSQL: Setting Up a Standby Node at a Different Geo-Location Over a VPN

Previously, we wrote about Setting Up a Geo-Distributed Database Cluster Using MySQL Replication. This time, it's about PostgreSQL. Setting up a geo-distributed cluster for PostgreSQL is not a new concept and the topology is quite...

March 13, 2020

An Overview of Client-Side Field Level Encryption in MongoDB

Data often requires high end security on nearly every level of the data transaction so as to meet security policies, compliance, and government regulations. Organization reputation may be wrecked if there is unauthorized access to...

February 26, 2020

How to Protect Your MySQL & MariaDB Database Against Cyberattacks When on a Public Network

It is sometimes inevitable to run MySQL database servers on a public or exposed network. This is a common setup in a shared hosting environment, where a server is configured with multiple services and often...

February 20, 2020

How to Protect your MySQL or MariaDB Database From SQL Injection: Part Two

In the first part of this blog we described how ProxySQL can be used to block incoming queries that were deemed dangerous. As you saw in that blog, achieving this is very easy. This is...

February 10, 2020

How to Protect your MySQL or MariaDB Database From SQL Injection: Part One

Security is one of the most important elements of the properly designed database environment. There are numerous attack vectors used with SQL injection being probably the most popular one. You can design layers of defence...

February 5, 2020

Is My Database Vulnerable to Attack? A Security Checklist

Data is probably the most important asset in a company, so you should make sure your database is secured to avoid any possible data theft. It’s hard to create an environment that is 100% secure,...

January 23, 2020

Database Backups 101: Database Backup Security Considerations

Data security is important to protect the data in an organisation from unauthorised access, malicious attacks, or phishing activities. The term database security includes the methods taken to protect the security breach from the data...

Subscribe below to be notified of fresh posts