Tag: security

Advice for responding to the WPA2 security flaw

By now everyone’s likely heard about the serious vulnerability affecting the Wi-Fi security protocol WPA2 that secures the wireless communications of just about every consumer device out there. The Key Reinstallation Attacks (KRACK) allow an attacker to control the encryption…

Read More >

Why Privileged Access Management Isn’t Optional at Pythian

According to the Washington Post, at the end of June the FBI and the Department of Homeland Security sent a joint alert to the energy sector stating that “advanced, persistent threat actors” — a euphemism for sophisticated foreign hackers —…

Read More >

New MySQL File System Vulnerabilities

Get insight into the recent MySQL file system vulnerabilities.

Read More >

DirtyC0w – is that a beverage? Ensuring the Security of Your Linux Servers

What should you do about the Dirty C0w vulnerability?

Read More >

Cassandra 3.9 Security Feature Walk-through

This post goes through the available security features one-by-one in Cassandra version 3.9.

Read More >

Auditing MySQL Users With McAfee Plugin

Ivan Groenewold, MySQL Database Consultant at Pythian, discusses auditing MySQL users with the McAffee plugin.

Read More >

Protect Against MySQL Vulnerability CVE-2016-6662

Derek Downey, OSDB Practice Advocate at Pythian, explains how to protect against the MySQL bug CVE-2016-6662.

Read More >

SQL Server Security Review Using PowerShell

Sandeep Arora, SQL Server Database Consultant, explains how to automate a SQL Server Security review using PowerShell.

Read More >

Encrypting sensitive data in puppet using hiera-eyaml

Minto Joseph, Site Reliability Consultant at Pythian, explains how to encrypting sensitive data in puppet using hiera-eyaml.

Read More >

Properly removing users in MySQL

Pep Pla, MySQL Database Consultant at Pythian, explains how to properly remove users in MySQL.

Read More >
Page 1 of 3123