<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

Data Breach Response Plan: Your Guide to Leak Prevention

Data Breach Response Plan: Your Guide to Leak Prevention

A breach isn’t a matter of if, it’s when. In 2023 alone, around 97 million accounts were breached in the US, accounting for one in three cases
Creating Tables in PostgreSQL: Full Guide (with Example)

Creating Tables in PostgreSQL: Full Guide (with Example)

Learn how to create tables in PostgreSQL using psql or pgAdmin. Master data types, constraints, and schema design, and secure access with StrongDM's
MySQL SHOW USERS: How to List All Users in a Database
MySQL SHOW USERS: How to List All Users in a Database
Learn how to list MySQL users using SQL queries and GUI tools like Workbench and phpMyAdmin. Discover how to check privileges, manage accounts, and secure access with best practices, and see how StrongDM simplifies MySQL user management.
Hackers Don’t Hack In. They Log In.
Hackers Don’t Hack In. They Log In.
Most breaches don’t begin with hacking—they start with logging in. Discover how compromised credentials fuel modern cyberattacks and why Zero Trust Privileged Access is essential for securing today’s identity-driven environments.
Kubernetes Security: Guide to Securing Your Clusters
Kubernetes Security: Guide to Securing Your Clusters
Kubernetes security is the practice of protecting containerized workloads and cluster components from unauthorized access, misconfigurations, and vulnerabilities. It involves securing the infrastructure, clusters, containers, and application code through layered controls like RBAC, network policies, image scanning, and runtime protection.
PostgreSQL Default Password: Everything You Need to Know
PostgreSQL Default Password: Everything You Need to Know
PostgreSQL doesn’t come with a default password. And while that might seem like a security feature, leaving it unset can be just as risky. Understanding how Postgres handles authentication—from pg_hba.conf rules to encryption types like MD5 and SCRAM—is essential for keeping your database secure. Missteps in configuration or password management can open the door to unauthorized access.
How to Enable SSH on Ubuntu: A Step-by-Step Guide
How to Enable SSH on Ubuntu: A Step-by-Step Guide
SSH is the backbone of remote access on Linux systems—and if you're running Ubuntu, enabling SSH is often one of the first things you'll do. But enabling it securely is what really matters. From installing OpenSSH and adjusting firewalls to enforcing key-based authentication and disabling root login, a secure setup takes more than just flipping a switch .This guide walks you through every step, plus how to make SSH access safer and simpler with centralized control, just-in-time access, and full
How to Show/List Tables in PostgreSQL (psql, SQL & pgAdmin)
How to Show/List Tables in PostgreSQL (psql, SQL & pgAdmin)
Listing tables in PostgreSQL is a basic yet essential task—whether you're debugging, automating CI/CD, or exploring a new database. But with sensitive data at stake, how you access matters. This guide covers common methods and how to secure them with centralized access, audit logs, and least-privilege controls.
Linux File Permissions Explained: chmod, chown, umask
Linux File Permissions Explained: chmod, chown, umask
Linux file permissions control who can read, write, or execute files—crucial for system security. But with special bits, ACLs, and recursive commands, managing them can get tricky. This guide simplifies permissions and shows how to manage them safely with centralized access, audit logging, and role-based control—so you’re not stuck juggling chmod and chown alone.
Top 7 Secrets Management Tools for 2025 and Beyond
Top 7 Secrets Management Tools for 2025 and Beyond
Explore the top 7 secrets management tools, including StrongDM, HashiCorp Vault, AWS Secrets Manager, and Doppler. Discover secure, Zero Trust solutions that reduce secret sprawl, automate credential rotation, enforce least privilege, and integrate seamlessly with DevOps workflows.
What Is Linux Security? Features, Best Practices & Tools
What Is Linux Security? Features, Best Practices & Tools
Linux powers everything—from servers to IoT devices—and with that power comes a big responsibility: security. Linux security is all about protecting your systems from breaches, misconfigurations, and evolving threats without compromising performance. This guide explores everything from kernel-level protections to enterprise-grade defense strategies—and shows how to simplify Linux security by unifying access, enforcing Zero Trust, and replacing static credentials with identity-based access that
How to List All Groups in Linux: Complete Command Guide
How to List All Groups in Linux: Complete Command Guide
One of the most common and straightforward ways to list all groups in Linux systems is by leveraging the Linux "list groups" command. However, this isn’t the only way. There are several alternative methods, such as the "getent" command, the "/etc/group" file, and the "id" command. This guide will explore these methods in detail, so read on to get the full scoop.
A New Era of Vault-Agnostic Secrets Management Is Here
A New Era of Vault-Agnostic Secrets Management Is Here
Discover why traditional secrets management isn't enough. StrongDM Managed Secrets offers vault-agnostic, Zero Trust security with secretless access, dynamic policy enforcement, automated rotation, and unified audits—perfect for complex enterprise environments.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€