Tag - security

MongoDB 3.6 Security Improvements

Running MongoDB

In this blog post, we’ll look at MongoDB 3.6 security improvements.
As we’ve already talked about in this series, MongoDB 3.6 has a number of new features in it. But we have talked less about the new security enhancements in this release. The MongoDB 3.6 security features are particularly exciting. Some of these are just […]

Read more

Upcoming MongoDB Security Webinar November 8, 2017: Enhanced Security Using LDAP Authentication

MongoDB Security

Join Percona’s Senior Technical Services Engineer Adamo Tonete as he presents MongoDB Security Webinars: Enhanced Security Using LDAP Authentication on Wednesday, November 8, 2017 at 11:00 am PST / 2:00 pm EST (UTC-8).

Experience: Intermediate
Tags: SysAdmin, DBAs

In this webinar, we are going to demonstrate how to configure Percona Server for MongoDB in a secure replica-set […]

Read more

MongoDB Security: Using LDAP Authentication

MongoDB Security

In this blog post, we’ll focus on MongoDB security and discuss how to configure Percona Server for MongoDB to authenticate a user with an LDAP server.
It is important to mention that Percona Server for MongoDB features LDAP authentication free of charge for everyone in all our versions. This feature is not available in the MongoDB Community versions. […]

Read more

ProxySQL Improves MySQL SSL Connections

In this blog post, we’ll look at how ProxySQL improves MySQL SSL connection performance.
When deploying MySQL with SSL, the main concern is that the initial handshake causes significant overhead if you are not using connection pools (i.e., mysqlnd-mux with PHP, mysql.connector.pooling in Python, etc.). Closing and making new connections over and over can greatly impact […]

Read more

Revenge of Ransomware! MongoDB Security in the News Again . . .

MongoDB Security

A new set of MongoDB attacks and data breaches struck businesses this weekend, mirroring the attacks that hit back in January and putting MongoDB security back into the spotlight.
Like the last set, this new attack strategy focused on ransomware that demanded a paid ransom to unlock hijacked data. As with many security breaches, the attack was preventable – […]

Read more