Subscribe to the
Percona Newsletter

Subscribe Now!
  Wednesday, August 5, 2015    David Busby

If you are tasked with maintaining the security of your MySQL environment, this webinar can help you improve your security by going beyond your database to identify other areas of potential risk.

Security isn’t about just deploying some overbearing big brother of a hardware or software solution. And, it’s not about running scanning software that tells you you’re safe. In reality, in these types of setups-- you’re not.

Implementing a security strategy is akin to a high availability one in which you deploy multiple redundancies to ensure you can still operate. The same can and should be applied to security: identify the potential areas of attack, reduce this attack surface, and deploy multiple redundancies to secure your deployments.

About the Author

David Busby

David has been a Linux systems admin for around 14 years, and generally in different roles - development, network admin, support, DBA, and more. He is a Fedora user and a fan of puppet (not so much the hat - nor Bert & Ernie, however). As time allows, he contributes to the EPEL packages for Openstack. He has an interest in infosec, and so is generally paranoid about security. He is also familiar with metasploit, sqlmap, john, oclHashCat, and has also written a few python tools. Living in Whitchurch, United Kingdom, he holds a 2nd dan black belt in Ju-Jitsu and, with his Father and Uncle, helps to teach at a local non-profit club with ages ranging from 6+. He also teaches computing to students at a local school using the Raspberry Pi as the platform running Raspbian. He is proud that they're starting to grow beyond basic networking and logical programming patterns to get the students thinking about solving problems with basic robotics.