Gary Evans
Customer success and Technical Services. Provides Consulting, Support, and Training in PostgreSQL and FUJITSU Enterprise Postgres.
Fujitsu Enterprise Postgres proudly sponsored FOSSASIA Summit 2024, an enthusiastic gathering of innovators and collaborators in open source technology held in Hanoi, Vietnam, engaging 5,000+ participants from 50 countries.
Hey there, Database Administrators! After our dive into the 'Protect' pillar, it's time to shift gears to another crucial aspect of the NIST Cybersecurity Framework – the 'Detect' pillar. This is where our skills and vigilance come into play to identify potential cybersecurity events. Think of yourself as a digital detective in the vast landscape of data.
Hello, database dynamos! As we continue our look into Database Administrator security tasks and how they relate to the NIST Cybersecurity Framework, let’s follow on from risk management and talk about Governance and Data Security.
Hello, dedicated database gurus! As Database Administrators (DBAs), navigating the complex landscape of cybersecurity is crucial. The first pillar of the National Institute of Standards and Technology's (NIST) Cybersecurity Framework – Identify – provides a robust foundation for understanding and managing cybersecurity risks to systems, people, assets, data, and capabilities.
Hey there, DBA squad! Following our general introduction to encryption in database security, let’s dive deeper into the world of encryption types.
Hello, database heroes! In this article, I will decrypt the world of encryption in database security, and emphasize that encryption isn’t just about turning data into an indecipherable format – it’s a multifaceted shield safeguarding data at various levels, from resting quietly in your database to zipping through networks.
Here's a toast to PostgreSQL for clinching DB-Engines’ title for the fourth time!
Hello, database warriors! In this article, we're deepening our exploration into Fujitsu Enterprise Postgres and PostgreSQL security by focusing on access control. Remember, this involves two key elements: authentication, the process verifying identities, and authorization, the system determining access levels.
Hey there, database gurus! In our journey through the world of database security, today we're taking a focused dive into one example from the CIS Benchmark for PostgreSQL 16 – Section 4.4 on revoking excessive Data Manipulation Language (DML) privileges.
Hey database dynamos! After diving into the critical security roles in our last chat, let's switch gears and talk about something that can really set the stage for solid database security - security benchmarks.
Hey there, database defenders! As we embark on this detailed exploration into the world of database security, it's crucial to understand the various security roles within an organization, and that is what this blog post is about.
Our team is further extending its commitment to database security education through a new blog series featured right here.
The concept of data portability is relevant not only as part of the regulatory framework governing customer data privacy - it is also important for organizations moving data across applications and hybrid cloud. Let me show you how.
The value of data has increased exponentially in the last few years, to the point that it is now called the oil of the new industry. But so has the risk of data breaches.