SlideShare a Scribd company logo
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Security:	Best	PracGces	
	
Mark	Swarbrick	
Principle	Presales	Consultant	Uk&I
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Safe	Harbor	Statement	
The	following	is	intended	to	outline	our	general	product	direcGon.	It	is	intended	for	
informaGon	purposes	only,	and	may	not	be	incorporated	into	any	contract.	It	is	not	a	
commitment	to	deliver	any	material,	code,	or	funcGonality,	and	should	not	be	relied	upon	
in	making	purchasing	decisions.	The	development,	release,	and	Gming	of	any	features	or	
funcGonality	described	for	Oracle’s	products	remains	at	the	sole	discreGon	of	Oracle.	
ConfidenGal	–	Oracle	Internal/Restricted/Highly	Restricted	 2
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
43%	
of	companies	have	experienced	a	
data	breach	in	the	past	year.	
Source:	Ponemon	InsGtute,	2014	
Oracle	ConfidenGal	–	Internal/Restricted/Highly	Restricted	 3
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Mega	Breaches	
552	Million	idenGGes	
exposed	in	2013.		493%	
increase	over	previous	year	 77%	Web	sites	with	vulnerabiliGes.	
1-in-8	of	all	websites	had	a	
criGcal	vulnerability.		
8	
Breaches	that	exposed	
more	than	10	million	
records	in	2013.	
Total	Breaches	increased	
62%	in	2013			
Oracle	ConfidenGal	–	Internal/Restricted/Highly	Restricted	 4	
Source:	Internet	Security	Threat	Report	2014,	Symantec
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
•  Poor	ConfiguraGons	
– Set	controls	and	change	default	se_ng	
•  Over	Privileged	Accounts	
– Privilege	Policies	
•  Weak	Access	Control	
– Dedicated	AdministraGve	Accounts	
•  Weak	AuthenGcaGon	
– Strong	Password	Enforcement	
•  Weak	AudiGng	
– Compliance	&	Audit	Policies	
•  Lack	of	EncrypGon	
– Data,	Backup,	&	Network	EncrypGon	
•  Proper	CredenGal	&	Key	Management	
– Use	mysql_config_editor	,	Key	Vaults	
•  Unsecured	Backups	
– Encrypted	Backups	
•  No	Monitoring	
– Security	Monitoring,	Users,	Objects	
•  Poorly	Coded	ApplicaGons	
– Database	Firewall	
5	
Database	VulnerabiliGes
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Aiacks		
•  SQL	InjecGon	
–  PrevenGon:	DB	Firewall,	White	List,	Input	ValidaGon	
•  Buffer	Overflow	
–  PrevenGon:	Frequently	apply	Database	Solware	updates,	DB	Firewall,	White	List,	Input	ValidaGon			
•  Brute	Force	Aiack	
–  PrevenGon:	lock	out	accounts	aler	a	defined	number	of	incorrect	aiempts.	
•  Network	Eavesdropping	
–  PrevenGon:	Require	SSL/TLS	for	all	ConnecGons	and	Transport	
•  Malware		
–  PrevenGon:	Tight	Access	Controls,	Limited	Network	IP	access,		Change	default	se_ngs,	EncrypGon	
	
6
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Malicious	AcGons	
•  InformaGon	Disclosure:	Obtain	credit	card	and	other	personal	informaGon	
–  Defense:	EncrypGon	–	Data	and	Network,	Tighter	Access	Controls		
•  Denial	of	Service:	Run	resource	intensive	queries	
–  Defense:	Resource	Usage	Limits	–	Set	various	limits	–	Max	ConnecGons,	Sessions,	Timeouts,	…	
•  ElevaGon	of	Privilege:	Retrieve	and	use	administrator	credenGals	
–  Defense:	Stronger	authenGcaGon,	Access	Controls,	AudiGng	
•  Spoofing:	Retrieve	and	use	other	credenGals	
–  Defense:	Stronger	account	and	password	policies		
•  Tampering:	Change	data	in	the	database,	Delete	transacGon	records	
•  Defense:	Tighter	Access	Controls,	AudiGng,	Monitoring,	Backups	
7
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Regulatory	Compliance	
•  RegulaGons	
–  PCI	–	DSS:	Payment	Card	Data	
–  HIPAA:	Privacy	of	Health	Data	
–  Sarbanes	Oxley:	Accuracy	of	Financial	Data	
–  EU	Data	ProtecGon	DirecGve:	ProtecGon	of	Personal	Data	
–  Data	ProtecGon	Act	(UK):	ProtecGon	of	Personal	Data	
•  Requirements	
–  ConGnuous	Monitoring	(Users,	Schema,	Backups,	etc)	
–  Data	ProtecGon	(EncrypGon,	Privilege	Management,	etc.)	
–  Data	RetenGon	(Backups,	User	AcGvity,	etc.)	
–  Data	AudiGng	(User	acGvity,	etc.)	
8
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
PCI-DSS	
•  Requirement	2:	Secure	ConfiguraGons,	Security	Se_ngs	&	Patching	
–  Not	Using	Vendor	Default	Passwords	and	Security	Se_ngs	
•  Requirement	3:	ProtecGng	Cardholder	Data	–	Strong	Cryptography	
–  Protect	Stored	Cardholder	Data	
–  Protect	EncrypGon	Keys	
•  Requirement	6:	Up	to	Date	Patching	and	Secure	Systems	
–  Develop	and	Maintain	Secure	Systems	and	ApplicaGons	
•  Requirement	7:	User	Access	and	AuthorizaGon	
–  Restrict	Access	to	Cardholder	Data	by	Need	to	Know	
•  Requirement	8:	IdenGty	and	Access	Management	
–  IdenGfy	and	AuthenGcate	Access	to	System	Components	
•  Requirement	10:	Monitoring,	Tracking	and	AudiGng		
–  Track	and	Monitor	Access	to	Cardholder	Data	
9	
		
White	Paper	
	
	A	Guide	to	MySQL		
				and	PCI	Compliance
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
DBA	ResponsibiliGes	
•  Ensure	only	users	who	should	get	access,	can	get	access	
•  Limit	what	users	and	applicaGons	can	do	
•  Limit	from	where	users	and	applicaGons	can	access	data	
•  Watch	what	is	happening,	and	when	it	happened	
•  Make	sure	to	back	things	up	securely	
•  Minimize	aiack	surface	
•  Ensure	encrypGon	keys	are	protected	and	managed
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenGal	–	Internal	 11	
MySQL	Security	Overview	
AuthenGcaGon	
AuthorizaGon	
EncrypGon	
Firewall	
MySQL	Security	
AudiGng
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Block	Threats	
AudiGng	
Regulatory	Compliance	
Login	and	Query	AcGviGes	
SSL/TLS		
Public/Private	Key		
Transparent	EncrypGon	
Key	Management	
Privilege	Management	
AdministraGon	
Database	&	Objects	
Proxy	Users	
MySQL		
Linux	/	LDAP	
Windows	AD	
Custom	
	
Oracle	ConfidenGal	–	Internal	 12	
MySQL	Security	Overview	
AuthorizaGon				AuthenGcaGon		
Firewall	&		
AudiGng	
EncrypGon	
	
Security
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	AuthorizaGon	
•  AdministraGve	Privileges	
•  Database	Privileges	
•  Session	Limits	and	Object	Privileges	
•  Fine	grained	controls	over	user	privileges		
– CreaGng,	altering	and	deleGng	databases		
– CreaGng,	altering	and	deleGng	tables		
– Execute	INSERT,	SELECT,	UPDATE,	DELETE	queries		
– Create,	execute,	or	delete	stored	procedures	and	with	what	rights	
– Create	or	delete	indexes	
13	
Security	Privilege	Management	in	MySQL	Workbench
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	AuthenGcaGon	
•  Built	in	AuthenGcaGon	
–  user	table	stores	users	and	encrypted	passwords	
•  X.509	
–  Server	authenGcates	client	cerGficates	
•  MySQL	NaGve,	SHA	256	Password	plugin	
–  NaGve	uses	SHA1	or	plugin	with	SHA-256	hashing	and	per	user	salGng	for	user	account	passwords.	
•  MySQL	Enterprise	AuthenGcaGon	
–  Microsol	AcGve	Directory	
–  Linux	PAMs	(Pluggable	AuthenGcaGon	Modules)	
•  Support	LDAP	and	more	
•  Custom	AuthenGcaGon	
14
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Password	Policies	
•  Accounts	without	Passwords	
– Assign	passwords	to	all	accounts	to	prevent	unauthorized	use	
•  Password	ValidaGon	Plugin	
– Enforce	Strong	Passwords	
•  Password	ExpiraGon/RotaGon	
– Require	users	to	reset	their	password	
•  Account	lockout	(in	v.	5.7)	
15
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	EncrypGon	
•  SSL/TLS	EncrypGon	
– Between	MySQL	clients	and	Server	
– ReplicaGon:	Between	Master	&	Slave	
•  Data	EncrypGon	
– AES	Encrypt/Decrypt	
•  MySQL	Enterprise	TDE	
– Transparent	Data	Enc	rypGon	
– Key	Management	(KMIP)	
16	
•  MySQL	Enterprise	EncrypGon	
– Asymmetric	Encrypt/Decrypt	
– Generate	Public	Key	and	Private	Keys	
– Derive	Session	Keys	
– Digital	Signatures	
•  MySQL	Enterprise	Backup	
– AES	Encrypt/Decrypt
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Firewall	
•  SQL	InjecGon	Aiacks		
– #1	Web	ApplicaGon	Vulnerability	
– 77%	of	Web	Sites	had	vulnerabiliGes	
•  MySQL	Enterprise	Firewall	
– Monitor	database	statements	in	real-Gme	
– AutomaGc	White	List	“rules”	generaGon	for	any	applicaGon	
– Block	SQL	InjecGon	Aiacks	
– Intrusion	DetecGon	System	
17
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	AudiGng	
• AudiGng	for	Security	&	Compliance	
– FIPS,	HIPAA,	PCI-DSS,	SOX,	DISA	STIG,	…	
• MySQL	built-in	logging	infrastructure:	
– general	log,	error	log	
• MySQL	Enterprise	Audit	
– Granularity	made	for	audiGng	
– Can	be	modified	live	
– Contains	addiGonal	details	
– CompaGble	with	Oracle	Audit	Vault.
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenGal	–	Internal	 19	
MySQL	Database	Hardening	
User	Management	
•  Remove	Extra	Accounts	
•  Grant	Minimal	Privileges		
•  Audit	users	and	privileges	
ConfiguraGon	
•  Firewall	
•  AudiGng	and	Logging	
•  Limit	Network	Access	
•  Monitor	changes	
InstallaGon	
•  Mysql_secure_installaGon	
•  Keep	MySQL	up	to	date	
•  MySQL	Installer	for	Windows	
•  Yum/Apt	Repository	
	
Backups	
•  Monitor	Backups	
•  Encrypt	Backups	
EncrypGon	
•  SSL/TLS	for	Secure	
ConnecGons	
•  Data	EncrypGon	(AES,	RSA)	
•  TDE	
Passwords	
•  Strong	Password	Policy	
•  Hashing,	ExpiraGon	
•  Password	ValidaGon	Plugin
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	5.7	Linux	Packages	-	Security	Improvements	
•  Test/Demo	database	has	been	removed	
–  Now	in	separate	packages	
•  Anonymous	account	creaGon	is	removed.	
•  CreaGon	of	single	root	account	–	local	host	only	
•  Default	installaGon	ensures	encrypted	
communicaGon	by	default		
–  AutomaGc	generaGon	of	SSL/RSA	Certs/Keys	
•  For	EE	:	At	server	startup	if	opGons	Certs/Keys	were	not	set	
•  For	CE	:	Through	new	mysql_ssl_rsa_setup	uGlity	
•  AutomaGc	detecGon	of	SSL	Certs/Keys	
20	
•  Client	aiempts	secure	TLS	connecGon	by	default	
•  Compile	Gme	restricGon	over	locaGon	used	for	
data	import/export	operaGons	
•  Ensures	locaGon	has	restricted	access		
•  Only	mysql	user	and	group	
•  Supports	disabling	data	import/export		
•  Set	secure-file-priv	to	empty	string	
	
MySQL	Installer	for	Windows		includes	various	Security	Setup	and	Hardening	Steps
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	EdiGon	
•  MySQL	Enterprise	AuthenGcaGon	
–  External	AuthenGcaGon	Modules	
•  Microsol	AD,	Linux	PAMs	
•  MySQL	Enterprise	EncrypGon	
–  Public/Private	Key	Cryptography	
–  Asymmetric	EncrypGon	
–  Digital	Signatures,	Data	ValidaGon	
•  MySQL	Enterprise	Firewall	
–  Block	SQL	InjecGon	Aiacks	
–  Intrusion	DetecGon		
•  MySQL	Enterprise	Audit	
–  User	AcGvity	AudiGng,	Regulatory	Compliance 		
21	
•  MySQL	Enterprise	Monitor	
–  Changes	in	Database	ConfiguraGons,	Users	
Permissions,	Database	Schema,	Passwords	
•  MySQL	Enterprise	Backup		
–  Securing	Backups,	AES	256	encrypGon	
•  MySQL	Enterprise	TDE	
–  AES	256	encrypGon	
–  Key	Management
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Monitor	
•  Enforce	MySQL	Security	Best	PracGces	
–  IdenGfies	VulnerabilGes	
–  Assesses	current	setup	against	security	hardening	policies	
•  Monitoring	&	AlerGng	
–  User	Monitoring	
–  Password	Monitoring	
–  Schema	Change	Monitoring	
–  Backup	Monitoring	
–  ConfiguraGon	Management	
–  ConfiguraGon	Tuning	Advice	
•  Centralized	User	Management	
22	
"I	definitely	recommend	the	MySQL	Enterprise	
Monitor	to	DBAs	who	don't	have	a	ton	of	MySQL	
experience.	It	makes	monitoring	MySQL	security,	
performance	and	availability	very	easy	to	
understand	and	to	act	on.”	
Sandi	Barr	
Sr.	Solware	Engineer	
Schneider	Electric
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall	
•  Block	SQL	InjecGon	Aiacks	
– Allow:	SQL	Statements	that	match	Whitelist	
– Block:	SQL	statements	that	are	not	on	Whitelist		
•  Intrusion	DetecGon	System	
– Detect:	SQL	statements	that	are	not	on	Whitelist	
•  SQL	Statements	execute	and	alert	administrators	
	
23	
Select *.* from employee where id=22
Select *.* from employee where id=22 or 1=1
Block	✖ 	
Allow	✔	
White	List	
Applica6ons	
Detect	&	Alert	
Intrusion	DetecGon
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	AuthenGcaGon	
24	
•  Integrate	with	Centralized	AuthenGcaGon	Infrastructure		
– Centralized	Account	Management	
– Password	Policy	Management	
– Groups	&	Roles	
•  PAM	(Pluggable	AuthenGcaGon	Modules)	
– Standard	interface	(Unix,	LDAP,	Kerberos,	others)	
– Windows		
•  Access	naGve	Windows	service	-	Use	to	AuthenGcate	users	using	Windows	
AcGve	Directory	or	to	a	naGve	host	
Integrates	MySQL	with	exisGng	
security	infrastructures
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	EncrypGon	
•  MySQL	encrypGon	funcGons	
– Symmetric	encrypGon	AES256	(All	EdiGons)	
– Public-key	/	asymmetric	cryptography	–	RSA	
•  Key	management		funcGons	
– Generate	public	and	private	keys	
– Key	exchange	methods:	DH	
•  Sign	and	verify	data	funcGons	
– Cryptographic	hashing	for	digital	signing,	verificaGon,	&	validaGon	–	RSA,DSA	
25
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	AudiGng	
•  “Trust	but	verify"	approach	to	security	
– Ensure	users	with	strong	privileges	don’t	misuse	those	privileges	
•  Business	Audit	–	Data	Validity	
– Here’s	proof	my	database	data	is	accurate/correct	
– Prove	no	tampering	to	data	has	occurred	
•  Forensic	analysis	–	as	a	component	of	any	defense-in-depth	strategy	
– ProacGve	-	Am	being	/	Was	hacked	
– ReacGve	–	How	were	we	hacked,	what	was	changed,	taken,	etc.	
26	
Maintaining	an	audit	trail	is	an	essenGal	security	best	pracGce
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Audit	
•  Out-of-the-box	logging	of	connecGons,	logins,	and	query	
•  Simple	to	fine	grained	policies	for	filtering,	and	log	rotaGon	
•  Dynamically	enabled,	disabled:	no	server	restart	
•  XML-based	audit	stream	
– Send	data	to	a	remote	server	/	audit	data	vault		
•  Oracle	Audit	Vault	
•  Splunk,	etc.	
27	
Adds	“regulatory	compliance”	
to	MySQL	applicaGons		
(HIPAA,	Sarbanes-Oxley,	PCI,	etc.)
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Backup	
•  Online	Backup	for	InnoDB	(scriptable	interface)	
•  Full,	Incremental,	ParGal	Backups	(with	compression)	
•  Strong	EncrypGon	(AES	256)	
•  Point	in	Time,	Full,	ParGal	Recovery	opGons	
•  Metadata	on	status,	progress,	history	
•  Scales	–	High	Performance/Unlimited	Database	Size	
•  Windows,	Linux,	Unix	
•  CerGfied	with	Oracle	Secure	Backup,	NetBackup,	Tivoli,	others	
28
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Oracle	CerGficaGons	
• Oracle	Enterprise	Manager	for	
MySQL	
• Oracle	Linux	(w/DRBD	stack)	
• Oracle	VM	
• Oracle	Solaris	
•  Oracle	Solaris	Clustering	
•  Oracle	Clusterware	
• Oracle	Audit	Vault	and	Database	Firewall	
• Oracle	Secure	Backup	
• Oracle	Fusion	Middleware	
• Oracle	GoldenGate	
• My	Oracle	Support	
	
MySQL	integrates	into	your	Oracle	environment	
29
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Oracle	Audit	Vault	and	Database	Firewall	
•  Oracle	DB	Firewall	
– Oracle,	MySQL,	SQL	Server,	IBM	DB2,	Sybase	
– AcGvity	Monitoring	&	Logging	
– White	List,	Black	List,	ExcepGon	List	
•  Audit	Vault	
– Built-in	Compliance	Reports	
– External	storage	for	audit	archive	
30
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Thank	You

More Related Content

What's hot

MySQL Clusters
MySQL ClustersMySQL Clusters
MySQL Clusters
Mark Swarbrick
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Mark Swarbrick
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
Mark Swarbrick
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud Service
Mark Swarbrick
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
Mark Swarbrick
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
Mark Swarbrick
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
Mark Swarbrick
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
Mark Swarbrick
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
Mark Swarbrick
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
Mark Swarbrick
 
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
Mark Swarbrick
 
MySQL + GDPR
MySQL + GDPRMySQL + GDPR
MySQL + GDPR
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center StrategiesVenkat Nambiyur
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
Mark Swarbrick
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Database
gvenzl
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
Mark Swarbrick
 
Java EE 8 - February 2017 update
Java EE 8 - February 2017 updateJava EE 8 - February 2017 update
Java EE 8 - February 2017 update
David Delabassee
 

What's hot (20)

MySQL Clusters
MySQL ClustersMySQL Clusters
MySQL Clusters
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud Service
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
 
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
 
MySQL + GDPR
MySQL + GDPRMySQL + GDPR
MySQL + GDPR
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center Strategies
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Database
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
 
Java EE 8 - February 2017 update
Java EE 8 - February 2017 updateJava EE 8 - February 2017 update
Java EE 8 - February 2017 update
 

Viewers also liked

MySQL Fabric
MySQL FabricMySQL Fabric
MySQL Fabric
Mark Swarbrick
 
20120426 high availability MySQL
20120426 high availability MySQL20120426 high availability MySQL
20120426 high availability MySQL
Jui-Nan Lin
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
Bogdan Kecman
 
MySQL 5.6 Replication Webinar
MySQL 5.6 Replication WebinarMySQL 5.6 Replication Webinar
MySQL 5.6 Replication Webinar
Mark Swarbrick
 
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
Dave Stokes
 
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware companyMySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
Continuent
 
Using MySQL Fabric for High Availability and Scaling Out
Using MySQL Fabric for High Availability and Scaling OutUsing MySQL Fabric for High Availability and Scaling Out
Using MySQL Fabric for High Availability and Scaling Out
OSSCube
 
MySQL Group Replication - an Overview
MySQL Group Replication - an OverviewMySQL Group Replication - an Overview
MySQL Group Replication - an Overview
Matt Lord
 
Architecture Patterns - Open Discussion
Architecture Patterns - Open DiscussionArchitecture Patterns - Open Discussion
Architecture Patterns - Open Discussion
Nguyen Tung
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
Ulf Wendel
 
Best practices for MySQL High Availability
Best practices for MySQL High AvailabilityBest practices for MySQL High Availability
Best practices for MySQL High Availability
Colin Charles
 
High Availability in the Cloud - Architectural Best Practices
High Availability in the Cloud - Architectural Best PracticesHigh Availability in the Cloud - Architectural Best Practices
High Availability in the Cloud - Architectural Best Practices
RightScale
 

Viewers also liked (12)

MySQL Fabric
MySQL FabricMySQL Fabric
MySQL Fabric
 
20120426 high availability MySQL
20120426 high availability MySQL20120426 high availability MySQL
20120426 high availability MySQL
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
MySQL 5.6 Replication Webinar
MySQL 5.6 Replication WebinarMySQL 5.6 Replication Webinar
MySQL 5.6 Replication Webinar
 
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
 
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware companyMySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
 
Using MySQL Fabric for High Availability and Scaling Out
Using MySQL Fabric for High Availability and Scaling OutUsing MySQL Fabric for High Availability and Scaling Out
Using MySQL Fabric for High Availability and Scaling Out
 
MySQL Group Replication - an Overview
MySQL Group Replication - an OverviewMySQL Group Replication - an Overview
MySQL Group Replication - an Overview
 
Architecture Patterns - Open Discussion
Architecture Patterns - Open DiscussionArchitecture Patterns - Open Discussion
Architecture Patterns - Open Discussion
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
Best practices for MySQL High Availability
Best practices for MySQL High AvailabilityBest practices for MySQL High Availability
Best practices for MySQL High Availability
 
High Availability in the Cloud - Architectural Best Practices
High Availability in the Cloud - Architectural Best PracticesHigh Availability in the Cloud - Architectural Best Practices
High Availability in the Cloud - Architectural Best Practices
 

Similar to MySQL Security Best Practises

Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
gvenzl
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
Artur Alves
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
Alithya
 
The Rise of Adaptive Marketing
The Rise of Adaptive MarketingThe Rise of Adaptive Marketing
The Rise of Adaptive Marketing
Demandbase
 
Manual oracle
Manual oracleManual oracle
Manual oracle
Milan Mergildo Rivera
 
Oracle cmg15
Oracle cmg15Oracle cmg15
Oracle cmg15
Kellyn Pot'Vin-Gorman
 
Coherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gemsCoherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gems
harvraja
 
Time-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAXTime-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAX
SUPREET OBEROI
 
Oracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User ExperiencesOracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User Experiences
Getting value from IoT, Integration and Data Analytics
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
Oracle Korea
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
Artur Alves
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Wearable Banking (2015)
Wearable Banking (2015)Wearable Banking (2015)
Wearable Banking (2015)
Isabel Fernández Peñuelas
 
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
Jürgen Ambrosi
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
Sandesh Rao
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
Sandesh Rao
 
Developers vs DBAs - How to win the war
Developers vs DBAs - How to win the warDevelopers vs DBAs - How to win the war
Developers vs DBAs - How to win the war
gvenzl
 
Enabling Project Collaboration with Primavera P6
Enabling Project Collaboration with Primavera P6Enabling Project Collaboration with Primavera P6
Enabling Project Collaboration with Primavera P6
p6academy
 

Similar to MySQL Security Best Practises (20)

Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
 
The Rise of Adaptive Marketing
The Rise of Adaptive MarketingThe Rise of Adaptive Marketing
The Rise of Adaptive Marketing
 
Manual oracle
Manual oracleManual oracle
Manual oracle
 
Oracle cmg15
Oracle cmg15Oracle cmg15
Oracle cmg15
 
Coherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gemsCoherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gems
 
Time-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAXTime-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAX
 
Oracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User ExperiencesOracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User Experiences
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Wearable Banking (2015)
Wearable Banking (2015)Wearable Banking (2015)
Wearable Banking (2015)
 
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
 
Developers vs DBAs - How to win the war
Developers vs DBAs - How to win the warDevelopers vs DBAs - How to win the war
Developers vs DBAs - How to win the war
 
Enabling Project Collaboration with Primavera P6
Enabling Project Collaboration with Primavera P6Enabling Project Collaboration with Primavera P6
Enabling Project Collaboration with Primavera P6
 

More from Mark Swarbrick

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
Mark Swarbrick
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
Mark Swarbrick
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
Mark Swarbrick
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
Mark Swarbrick
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
Mark Swarbrick
 
MySQL 8
MySQL 8MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
Mark Swarbrick
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
Mark Swarbrick
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
Mark Swarbrick
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
Mark Swarbrick
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
Mark Swarbrick
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
Mark Swarbrick
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
Mark Swarbrick
 

More from Mark Swarbrick (13)

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
 
MySQL 8
MySQL 8MySQL 8
MySQL 8
 
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

MySQL Security Best Practises