Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to deploy PostgresSQL on Kubernetes

Kubernetes is a container orchestration platform that automates the deployment, scaling, and management of containerized applications, abstracting many of the manual steps of rolling upgrades and scaling. When building cloud-native applications, you’ll often need to deploy database applications like PostgreSQL so that your applications can leverage their features within the cluster.

Database Monitoring: The Complete Guide

Databases are an integral part of modern IT infrastructure and power almost every modern application. After all, databases store the persistent information that applications run on. That’s why monitoring these databases is crucial: ensuring system health and performance and forming a vital component of any observability practice.

How we navigated database limits with a growing product

In 2024, one of Vanta’s engineering goals was to improve the quality while maintaining our rapid product development. Around the same time, we also discovered we were months away from reaching our MongoDB Atlas database storage limit. If this threshold was reached, then we wouldn't be able to write any new data and the Vanta product would’ve been heavily degraded. This was a clear signal that we needed to invest more in our infrastructure and storage solution. ‍

Sinister SQL Queries and How to Catch Them

SQL Server is more than just a database—it's a powerful platform that can be leveraged by attackers for system access, persistence, and code execution. While organizations focus on protecting their valuable data, they often overlook the inherent capabilities within SQL Server that make it an attractive target for adversaries looking to establish footholds in Microsoft environments.

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

Financial institutions are robbed in innumerable ways. Gunmen conduct physical attacks on bank branches; people commit credit card fraud; hackers attempt to break into ATMs and force them to spit out thousands of dollars, while other threat actors seek to bypass these small-scale incidents and go for millions via a cyberattack. After all, why steal a couple of thousand dollars, pounds, or Euros if you can attempt to blackmail an organization for millions, steal and sell its data, or a little bit of both?

CVE-2025-1094: SQL Injection Vulnerability in PostgreSQL's Escaping Functions

CVE-2025-1094 presents a critical challenge to established SQL security paradigms, effectively circumventing fundamental best practices. Though initially reported over a month ago, the gravity of its implications warrants an extensive analysis. This vulnerability challenges the long-held assumption that proper escaping guarantees protection against SQL injection attacks.

A Basic Guide to SQL Server Security Fundamentals

Organizations today collect and generate enormous volumes of sensitive data. Much of it is stored in SQL Server databases, making SQL Server security management crucial for protecting critical applications and services. Implementing strong Microsoft SQL Server security measures helps organizations defend against cyber threats and comply with regulations like GDPR, HIPAA, and PCI DSS.

SQL Server Audit: Expert tips and best practices

The database is the backbone of any organization. It stores confidential information, financial records and other sensitive data. That is why security of a database should always be a number one priority. One of the ways to make your database meet the security requirements is to conduct thedatabase audit. In this piece we will have a closer look at database audit types, provide expert tips to make this process smooth and decide whether the database migration is an optimal way out of solving database issues. Without further ado, let's begin.