Tag - security

Webinar Thursday July 6, 2017: Security and Encryption in the MySQL World

Security and Encryption

Join Percona’s Solutions Engineer, Dimitri Vanoverbeke as he presents Security and Encryption in the MySQL World on Thursday, July 6, 2017, at 7:00 am PDT / 10:00 am EDT (UTC-7).
Register Now
 
MySQL and MariaDB Server provide many new features that help with security and encryption, both of which are extremely important in today’s world. Learn […]

Read more

MySQL Encryption at Rest – Part 2 (InnoDB)

MySQL Encryption at Rest

Welcome to Part 2 in a series of blog posts on MySQL encryption at rest. This post covers InnoDB tablespace encryption.
At Percona, we work with a number of clients that require strong security measures for PCI, HIPAA and PHI compliance, where data managed by MySQL needs to be encrypted “at rest.” As with all […]

Read more

SSL Connections in MySQL 5.7

SSL Connections

This blog post looks at SSL connections and how they work in MySQL 5.7.
Recently I was working on an SSL implementation with MySQL 5.7, and I made some interesting discoveries. I realized I could connect to the MySQL server without specifying the SSL keys on the client side, and the connection is still secured […]

Read more

MySQL Encryption at Rest – Part 1 (LUKS)

MySQL Encryption at Rest

In this first of a series of blog posts, we’ll look at MySQL encryption at rest.
At Percona, we work with a number of clients that require strong security measures for PCI, HIPAA and PHI compliance, where data managed by MySQL needs to be encrypted “at rest.” As with all things open source, there several options […]

Read more

MongoDB Authentication and Roles: Creating Your First Personalized Role

MongoDB Authentication and Roles

In this blog post, we’ll walk through the native MongoDB authentication and roles, and learn how to create personalized roles. It is a continuation of Securing MongoDB instances.

As said before, MongoDB features a few authentication methods and built-in roles that offer great control of both who is connecting to the database and what they are allowed […]

Read more