MySQL Security: Armoring Your Dolphin
View the recording of this webinar: http://www.percona.com/resources/mysql-webinars/mysql-security-armoring-...
From the operating system to the application layer, potential security holes and data leaks exist at every turn. A proper data security strategy involves both proper risk analysis and "defense in depth." This discussion examines both of these elements on multiple levels in a MySQL context. Topics covered include:
-Basic security concepts
-Security above the MySQL layer (network, hardware, OS, etc.)
-Tips for application design
-A more secure MySQL configuration
-Security-related changes in MySQL 5.6