7 Best Practices for SQL Server Security
According to the 2021 Thales Data Threat Report, 45% of US companies experienced a data breach in 2020. That is a scary statistic, and the truth is the actual number could be even higher as...
Severalnines earns ISO certification
In an ever-changing technology landscape, it is critical for companies to have systems and processes in place to tame the information security risks that affect their information assets. We have always been committed to protecting...
Security best practices for SQL Server
According to the 2021 Thales Data Threat Report, 45% of US companies experienced a data breach last year. That is a scary statistic, and the truth is the actual number could be even higher as...
Best Practices for MongoDB Security
When it comes to managing database systems, one crucial aspect is database security. The failure to lay a good foundation for security for any database system may result in a data breach whereby a third-party...
Are my MySQL server connections encrypted and safe?
One of the greatest factors and fundamentals of data governance is security. It is a good practice to have database security implemented in place whenever you have your data management involved for enterprise or mass...
How to configure AppArmor for PostgreSQL and TimescaleDB
Security is a must for all systems to protect your data as much as possible. Even when there is always a risk to be hacked, by following a security checklist will reduce this risk significantly....
How to configure SELinux for MySQL-based systems (MySQL/MariaDB Replication + Galera)
In the era that we are living in now, anything with a less secure environment is easily a target for an attack and becomes a bounty for the attackers. Compared to the past 20 years,...
How to configure AppArmor for MySQL-based systems (MySQL/MariaDB Replication + Galera)
Last week, we discussed how to configure AppArmor for MongoDB Replica Sets which basically has the same concepts applicable when configuring this for your MySQL-based systems. Indeed, security is very important because you have to...
How to configure SELinux for PostgreSQL and TimescaleDB
Data is the most important asset in a company, so you should take all the security considerations into account in your database to keep it as safe as possible. One important security feature on RedHat-based...
How to configure SELinux for MongoDB Replica Sets
By 2025, the world will store approximately 200 zettabytes of data. That data will be stored either in public, private, on-premises or cloud storage, PCs, laptops, smartphones and also Internet-of-Things (IoT) devices. On projection, the...
6 Critical Components of Successful Data Governance
Properly established data governance means that you can make faster and smarter decisions. It sounds simple, but it requires you to build a set of processes and a culture that respects certain key principles. If...
MongoDB Insecurity Levels and How to Avoid Them
Most database management systems have several techniques of securing their data from an outsider or an unauthorized person or application. The techniques prevent your data from being read or copied without the user’s permission. MongoDB...