Gary Evans
Customer success and Technical Services. Provides Consulting, Support, and Training in PostgreSQL and FUJITSU Enterprise Postgres.
Hello, database warriors! In this article, we're deepening our exploration into Fujitsu Enterprise Postgres and PostgreSQL security by focusing on access control. Remember, this involves two key elements: authentication, the process verifying identities, and authorization, the system determining access levels.
Hey there, database gurus! In our journey through the world of database security, today we're taking a focused dive into one example from the CIS Benchmark for PostgreSQL 16 – Section 4.4 on revoking excessive Data Manipulation Language (DML) privileges.
Hey database dynamos! After diving into the critical security roles in our last chat, let's switch gears and talk about something that can really set the stage for solid database security - security benchmarks.
Hey there, database defenders! As we embark on this detailed exploration into the world of database security, it's crucial to understand the various security roles within an organization, and that is what this blog post is about.
Our team is further extending its commitment to database security education through a new blog series featured right here.
The concept of data portability is relevant not only as part of the regulatory framework governing customer data privacy - it is also important for organizations moving data across applications and hybrid cloud. Let me show you how.
The value of data has increased exponentially in the last few years, to the point that it is now called the oil of the new industry. But so has the risk of data breaches.
A few weeks back, I discussed how Transparent Data Encryption safeguards your data even in case an attacker gets hold of your files. So this week I would like to talk about how PostgreSQL maps database objects into actual files. Let's dive in.
Information Technology security is getting more complex each time I visit the subject. This just makes it harder for Security Specialists, whose role is to ensure that all potential threats are mitigated across the myriad of hardware, firmware, and software that make up a modern Enterprise Infrastructure.
Servers these days are pretty reliable and can go long periods of time between restarts — but when a restart of several machines does occur, we don't want to find out that services haven't started up by hearing it from our customers.
With dedicated audit logging you can have an open source database strategy and still deliver compliance.
Micro-services bring with them a range of benefits for your organisation - make sure that you take full advantage by choosing the right type of data persistence.
See how the Mirroring Controller in Fujitsu Enterprise Postgres works to ensure business continuity when an abnormality is detected.
PGDay Down Under (PGDU) is on in Melbourne for data professionals and enthusiasts whether experienced in PostgreSQL or considering it for future applications.
PGCon 'unconferences' are now a critical part of the PostgreSQL development process. Here's why.