<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
How to Connect to a Remote PostgreSQL Database

How to Connect to a Remote PostgreSQL Database

Connecting to a remote PostgreSQL database can prove daunting for some teams. Your organization risks losing valuable time, which then leads to lost productivity. Thankfully, there are four different ways to connect to a remote PostgreSQL database and improve your team's efficiency.
What Is Network Level Authentication (NLA)? (How It Works)

What Is Network Level Authentication (NLA)? (How It Works)

Network Level Authentication (NLA) is a security feature of Microsoft’s Remote Desktop Protocol (RDP) that requires users to authenticate before establishing a remote session. By enforcing this pre-authentication step, NLA reduces the risk of unauthorized access, conserves server resources, and protects against attacks like credential interception and denial of service. While effective in securing RDP sessions, NLA is limited to a single protocol, lacks flexibility, and can add complexity in
How to Create a Database in PostgreSQL

How to Create a Database in PostgreSQL

Learn the step-by-step approach to creating a database in PostgreSQL. Our in-depth guide explores two main methods—using psql and pgAdmin.
How to Automate Continuous Compliance in AWS with StrongDM

How to Automate Continuous Compliance in AWS with StrongDM

Enterprises seek ways to effectively address the needs of dynamic, always-evolving cloud infrastructures, and StrongDM has developed a platform that is designed with built-in capabilities to support continuous compliance in AWS environments.
IP Whitelisting: Meaning, Alternatives & More [2024 Guide]

IP Whitelisting: Meaning, Alternatives & More [2024 Guide]

IP whitelisting is a security strategy that restricts access to a network/system to a specified list of trusted IP addresses. This approach ensures that only individuals using the approved addresses can access certain resources.
How to List Users in Linux (9 Methods with Examples)

How to List Users in Linux (9 Methods with Examples)

Need to keep tabs on who has access to your organization’s Linux system? This guide explores nine methods, with examples, that can help you quickly list users.
SCP Command in Linux: 10 Essential Examples

SCP Command in Linux: 10 Essential Examples

Discover 10 ways to leverage the SCP command in Linux. Learn how to incorporate options for specific file transfers and how to deal with common errors.
CyberArk-Wiz Partnership: Cloud Security or Cloud Confusion?

CyberArk-Wiz Partnership: Cloud Security or Cloud Confusion?

Yesterday, CyberArk announced a new partnership with Wiz, where they’re touting “complete visibility and control for cloud-created identities.” I know I’ve had my fun poking holes at CyberArk in the past, but with this announcement, they’ve just handed the world a glaringly tone-deaf admission of being outdated, un-innovative, and uninterested in what enterprise security teams actually want.
The State of AI in Cybersecurity Report by StrongDM

The State of AI in Cybersecurity Report by StrongDM

Artificial intelligence is reshaping industries across the board, and cybersecurity is no exception. But as AI evolves, so do the threats that keep cybersecurity professionals up at night. Just how serious is the concern? According to a StrongDM survey of 600 cybersecurity professionals, AI-driven threats are emerging as one of the top concerns for the future of cybersecurity.
Mitigating Shadow Access Risks with Zero Trust PAM

Mitigating Shadow Access Risks with Zero Trust PAM

Discover how StrongDM's Zero Trust PAM and fine-grained authorization secure cloud data plane access and mitigate shadow access risks without hindering productivity.
Cedar for Kubernetes: Authorization That Speaks Your Language

Cedar for Kubernetes: Authorization That Speaks Your Language

By simplifying the ability to enforce granular policies, Cedar has set a new benchmark for access control in Kubernetes, and we’re thrilled to be part of this journey. This evolution is a milestone for anyone dedicated to securing cloud infrastructure.
How To Change PostgreSQL User Password (3 Methods)

How To Change PostgreSQL User Password (3 Methods)

Data breaches have cost companies across industries an average of $4.88 million this year. Luckily, effectively preventing them comes down to simply managing user credentials effectively. In fact, regularly updating user passwords can notably reduce the risk of unauthorized access and data theft. Ready to level up your cybersecurity game? Here’s a step-by-step guide on how to change a PostgreSQL user password, why it’s important, and the best practices for securing your database. Read on!
How to Create Users in Linux with useradd (Step-by-Step)

How to Create Users in Linux with useradd (Step-by-Step)

Setting permissions, revoking access, and performing other user management duties in Linux can improve your system's security and organization, ensuring users can access the resources they need when they need to. The useradd command lets you create, modify, and check user accounts, helping you handle multi-user environments across various Linux distributions.
How to Change Password in Linux: A Step-by-Step Guide

How to Change Password in Linux: A Step-by-Step Guide

Explore our in-depth guide on how to change and edit passwords in Linux using various commands and tools. Also, learn some advanced Linux password management techniques.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀