Tag - security

On-Demand Webinar: Securing MongoDB

Securing MongoDB

MongoDB, like most any other commercial database you might care to name, has these five security subsystems:

Authentication
Authorization
Network Encryption
Data-at-rest Encryption
Auditing

In this on-demand webinar, you’ll first learn which threat each of the subsystems addresses. Second, you’ll learn which parts probably differ, by convention, to other databases you know. And lastly, you’ll receive some practical “where” and […]

Read more

Webinar July 14: How Percona Monitoring and Management Improves Database Security

Percona Monitoring and Management Improves Database Security

Data breaches seem to be a daily occurrence, so much so that seeing an article about the latest company to fall victim draws little attention outside of those immediately impacted. That is of course unless that company is yours and data security is your responsibility!
While companies continue to invest heavily in fortifying networks with […]

Read more

Security Threat Tool Design in Percona Monitoring and Management

Security Threat Tool Percona Monitoring and Management

Security Threat Tool (STT) is the new Percona Monitoring and Management (PMM) feature. It provides the ability to run automated security checks across all of your databases and detect potential security problems. For example: empty or default passwords, weak security settings, outdated database versions, misconfiguration, but also more complex and tricky issues.

Security checks developed […]

Read more

Top 7 Reasons Why Security Goes Wrong In A Database System

Why Security Goes Wrong In A Database System

Today I’m going to talk about my favorite trope, “database security”.
When done right, a good security policy not only protects your data but improves performance, system stability, and enhances the development life-cycle. When done wrong it not only risks the confidentiality and integrity of your data but it leaves your organization open to significant […]

Read more

Brute-Force MySQL Password From a Hash

Brute Force MySQL password

In most cases, MySQL password instructions provide information on changing MySQL user passwords on the production system (e.g., reset root password without restart). It is even recommended to change passwords regularly for security reasons. But still, sometimes DBA duties on legacy systems offer surprises and you need to recover the original password for some […]

Read more