Architecting for Security: A Guide for MySQL
Security is paramount today across the whole of IT. From time to time we hear about ransomware attacks or data leaks that have their origin in not secured databases or IT infrastructure. You may wonder:...
Database Encryption: Why and Where You Need to Have Data Encryption
Database encryption provides enhanced security for your at-rest and in-transit data. Many organizations have started to look at data encryption seriously with recent security breach cases. In most cases, database servers are a common target...
The DevOps Open-Source Database Audit Manual – Everything You Should Know
Auditing is the monitoring and recording of selected user database actions. It is typically used to investigate suspicious activity or monitor and gather data about specific database activities. For example, the database administrator can gather...
Database Security 101: Security in Open Source Databases
Data security is one of the most significant aspects of administering a database. Depending on the organizational structure, if you are managing the production database, you must monitor for unauthorized access and usage. This also...
Database Security 101: Understanding Database Access Privileges
Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...
COVID-19 Cyber Attacks Call for you to Backup Securely
The COVID-19 pandemic has had its fair share of influence on world media but of interest is the sheer amount of cyber attacks that have escalated since it began. Interestingly enough, is news of a...
Standardizing PostgreSQL Security Across Multi-Cloud Environments
Multi-Cloud Environment is a common topology and even recommended for a Disaster Recovery Plan (DRP), but the security could be a risk here as you need to add to the common security checks an extra...
Security Considerations for MariaDB Deployments on Hybrid Cloud Environment
Hybrid cloud can be a great way of adding flexibility to your existing on-prem deployments. As we discussed in several blogs, public cloud can be a great addition to your own datacenter, ensuring you can...
How to Encrypt Hybrid Cloud Database Traffic
A secure database environment is hard to achieve, but extremely important in order to avoid data breaches, ransomware and other malicious activity. Security of data is a top priority from a business standpoint. When running...
Hybrid Cloud vs Full Public Cloud – Pros & Cons
Technology consumers and users have embraced cloud computing ever since its boom. It implicates a very beneficial part nowadays to the technology on how humans use and interact with technology, especially the advent of IoT...
How to Keep a Hybrid Cloud Environment Secure
Having a Hybrid Cloud Environment is a common topology for a Disaster Recovery Plan (DRP), or even to have redundancy on your systems, but there are some security considerations to take into account before implementing...
How to Audit a PostgreSQL Database
Auditing is a good way to keep your data as safe as possible, and to know what is happening in your databases. It is also required for many security regulations or standards, like PCI -...