Categories
Products
Technologies
Top Rated docs

March 23, 2021

Tips and Tricks for Implementing Database Role-Based Access Controls for MariaDB

In a database management system (DBMS), role-based access controls (RBAC), is a restriction on database resources based on a set of pre-defined groups of privileges and has become one of the main methods for advanced...

March 17, 2021

Database Encryption: Why and Where You Need to Have Data Encryption

Database encryption provides enhanced security for your at-rest and in-transit data. Many organizations have started to look at data encryption seriously with recent security breach cases. In most cases, database servers are a common target...

March 16, 2021

The DevOps Open-Source Database Audit Manual – Everything You Should Know

Auditing is the monitoring and recording of selected user database actions. It is typically used to investigate suspicious activity or monitor and gather data about specific database activities. For example, the database administrator can gather...

March 12, 2021

Database Security 101: Security in Open Source Databases

Data security is one of the most significant aspects of administering a database. Depending on the organizational structure, if you are managing the production database, you must monitor for unauthorized access and usage. This also...

March 11, 2021

Database Security 101: Understanding Database Access Privileges

Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...

March 10, 2021

COVID-19 Cyber Attacks Call for you to Backup Securely

The COVID-19 pandemic has had its fair share of influence on world media but of interest is the sheer amount of cyber attacks that have escalated since it began. Interestingly enough, is news of a...

March 8, 2021

Security Considerations for MariaDB Deployments on Hybrid Cloud Environment

Hybrid cloud can be a great way of adding flexibility to your existing on-prem deployments. As we discussed in several blogs, public cloud can be a great addition to your own datacenter, ensuring you can...

March 3, 2021

How to Encrypt Hybrid Cloud Database Traffic

A secure database environment is hard to achieve, but extremely important in order to avoid data breaches, ransomware and other malicious activity. Security of data is a top priority from a business standpoint. When running...

February 23, 2021

How to Keep a Hybrid Cloud Environment Secure

Having a Hybrid Cloud Environment is a common topology for a Disaster Recovery Plan (DRP), or even to have redundancy on your systems, but there are some security considerations to take into account before implementing...

November 27, 2020

How to Secure MySQL: Part Two

In the previous post about MySQL security, we have covered a range of options that can be used to make your MySQL instance(s) more secure. They included: General MySQL security measures; Controlling access in MySQL;...

April 15, 2020

Setting up ClusterControl as a Bastion Host for your Database Servers

A bastion host is a gateway host between an inside network and an outside network. It is commonly used to access remote hosts sitting on a different network which has no direct connection between the...

April 7, 2020

My DBA is Sick – Database Security Tips for SysAdmins

The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...

Subscribe below to be notified of fresh posts