Will MySQL Make You the Next Target or Home Depot? Prime Factors Offers Educational Webinar to Discuss Best Practices for Transparent Encryption for MySQL Databases
(PRWEB) September 24, 2014 -- MySQL is the world's most popular open source freestanding database, and is an integral part of many web-delivered applications. However, many such applications were built without a complete appreciation of the sensitivity of the data the databases contain, and developers now must retrofit data protection into their active production instances. This is a little like inserting a catalytic converter onto an engine while it is running – it can be done, but there are a lot of ways to get burned. Prime Factors offers a free educational webinar "Best Practices for Transparent Encryption for MySQL Databases" on Thursday, September 25, at 1 PM Central. Registration is free.
Getting burned by a data breach can have serious consequences as was seen in the aftermath of the Target Stores data breach, and as is being seen now resulting from the Home Depot breach. In the former case, senior executives were obligated to leave the company and the chain has had to allocate almost $150M dollars to cover costs associated with the breach. While details of the Home Depot breach continue to emerge, the number of potentially impacted cardholders is reported to be even greater than those impacted by the Target breach. While many MySQL implementations are in organizations smaller than either retail chain, a breach of sensitive data contained in a MySQL database could have proportionately similar effects on companies of any size.
In this webinar, Prime Factors Jeff Cherrington interviews Sr. Software Engineer Keith Bucher in a discussion profiling the unique challenges of transparently adding data protection to MySQL databases, both for existing applications and for new applications. The options available for MySQL data protection are described, compared & contrasted with the Transparent Database Encryption offerings from Oracle® and Microsoft® SQL Server®, and questions from the live audience will be addressed. The session concludes with a list of five best practices for applying encryption transparently to data in MySQL databases.
Cherrington brings over 30 years of technology experience, working with the largest third party transaction processors, credit issuers, health care providers, and federal government agencies on data protection goals. Bucher has worked hands-on with the issues of network, database, and cryptographic data protection in both the public and private sectors for over 20 years. His contributions during the webinar reflect this practical experience.
"The extraordinary scale of the recent retail chain breaches dominates headlines," says Cherrington, "Most of those organizations have the resources to weather the impacts. However, a significant data breach could have more significant and lasting impacts on smaller organizations, even to the point they must consider liquidation."
For more information about this and other free educational webinars offered by Prime Factors, see http://www.primefactors.com/webinars.
For more information about Prime Factors, please see http://www.primefactors.com. For more information about the company's Bank Card Security System and its EMV-compliant payment card data preparation and personalization, please see http://www.primefactors.com/bcss.
Jeff Cherrington, Prime Factors, Inc., http://www.primefactors.com, +1 (414)207-3988, [email protected]
Share this article