Tagged articles
9 articles
Page 1 of 1
Xiao Liu Lab
Xiao Liu Lab
Oct 29, 2025 · Information Security

Secure MySQL 8 in 30 Minutes with 6 Production‑Ready Scripts

Learn how to transform a vulnerable MySQL 8 instance into a militarized, audit‑ready database in just half an hour by applying six ready‑to‑run shell and SQL scripts that disable high‑risk accounts, enable enterprise audit logging, enforce SSL, prune privileges, rotate root passwords, and generate compliance reports.

Audit loggingAutomationSSL
0 likes · 7 min read
Secure MySQL 8 in 30 Minutes with 6 Production‑Ready Scripts
Raymond Ops
Raymond Ops
Aug 7, 2025 · Databases

How to Enable and Configure MariaDB Audit Logging Plugin

This guide walks you through verifying, installing, configuring, and activating the MariaDB server_audit plugin, including required ConfigMap edits, optional SQL commands, and a Kubernetes rollout to ensure comprehensive audit logging of connections, queries, and table events.

Audit loggingDatabase SecurityKubernetes
0 likes · 4 min read
How to Enable and Configure MariaDB Audit Logging Plugin
21CTO
21CTO
Aug 23, 2024 · Information Security

Why Do Companies Fail at Data Security? Common Pitfalls and Solutions

This article examines why many enterprises repeatedly suffer data breaches, highlighting common security flaws such as manual permission management, account sharing, lack of least‑privilege, insufficient environment isolation, weak audit logging, and offers practical recommendations to strengthen information security.

Audit loggingZero Trustaccess control
0 likes · 14 min read
Why Do Companies Fail at Data Security? Common Pitfalls and Solutions
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerAudit loggingCDK
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
dbaplus Community
dbaplus Community
Sep 25, 2017 · Information Security

How GDPR Shapes Data Management Practices and Database Security

This article explains GDPR's key principles, the Discover‑Defend‑Detect framework, and concrete database controls such as data identification, retention, pseudonymisation, encryption, access control, disaster recovery, and audit logging needed to achieve compliance.

Audit loggingData ProtectionGDPR
0 likes · 12 min read
How GDPR Shapes Data Management Practices and Database Security