data encryption

Tech Optimizer
February 11, 2026
Percona has strengthened its position in the open source database market by introducing several key innovations, including the first fully open source implementation of Transparent Data Encryption (TDE) for PostgreSQL, 24/7 enterprise support for Valkey, and expanded Kubernetes Operators for MySQL, MongoDB, and PostgreSQL. The company has seen increased adoption from organizations moving away from proprietary licensing, with successful migrations such as BBVA transitioning to Percona's open source MongoDB stack. Percona has also engaged with the community through the release of the State of Open Source Database Management Report and hosting MySQL summits, while receiving recognition in various industry awards. The leadership team has expanded under CEO Peter Farkas, emphasizing the value of an open source-first approach.
Tech Optimizer
November 22, 2025
Percona introduced an open-source Transparent Data Encryption (TDE) extension for its PostgreSQL distribution at KubeCon+CloudNativeCon North America, addressing the demand for data protection solutions, particularly among financial institutions concerned about vendor lock-in. The TDE extension, named pg_tde, operates transparently, allowing users to input and query data without changes to interactions or schemas, while unauthorized access reveals only encrypted information. It supports all major key management services and is included in Percona's PostgreSQL distribution without additional licensing fees. The TDE solution helps organizations comply with standards like GDPR, HIPAA, SOX, and PCI DSS v4.0, offering benefits such as open-source readiness, stronger data protection, user-controlled encryption, seamless integration, centralized key management, effortless online encryption, and trusted support. Percona also offers solutions for MySQL and MongoDB and supports emerging technologies like Valkey.
Winsage
November 19, 2025
Microsoft is enhancing the Taskbar calendar flyout in Windows 11 to include an "agenda view," allowing users to view and interact with upcoming events and meetings. This feature, previously available in Windows 10, will debut in a preview next month. The update will provide a chronological list of events integrated with the Calendar, enabling users to join meetings directly. Additionally, Microsoft is introducing new AI capabilities, including AI-generated text in any text box and an agentic workspace feature. A hardware-accelerated version of BitLocker for faster data encryption will also launch next year on new PCs running Windows 11. The general availability of the new calendar feature is anticipated in 2026.
Tech Optimizer
September 15, 2025
Databases require robust protection against unauthorized access, primarily managed through Access Control Lists (ACL) using commands like GRANT and REVOKE. Challenges arise when attackers gain direct access to database files, especially if backups are stored insecurely or if databases are hosted in the cloud. Encrypting backups is common but can be cumbersome, particularly with large data volumes. If attackers access the file system, they may bypass SQL access altogether. Client-side encoding, such as using PostgreSQL's pgcrypto, protects sensitive data by encoding it before storage, but it faces challenges like key management, lack of SQL filtering, and the need for query rewrites. Transparent Data Encryption (TDE) allows SQL operations to function normally while keeping data unreadable on disk. Various TDE implementations exist, including Percona's initial TDE, which faced issues with unprotected indexes and performance slowdowns. Cybertec and EnterpriseDB encrypt entire clusters, simplifying the process but impacting performance and complicating technical support. Selective encryption approaches from Pangolin and Fujitsu allow for protecting specific tables, while Percona's recent TDE implementation also follows this model but lacks support for non-standard Table Access Methods (TAMs). Postgres Pro Enterprise TDE addresses key rotation and time-based analysis protection by storing a key index for each table page and using random initialization vectors and Message Authentication Codes for enhanced security. Future developments aim to improve TDE capabilities, including protecting compressed tablespaces and refining WAL data encryption.
AppWizard
September 11, 2025
Recent research has identified that 20 free VPN applications on Google Play share the same underlying code and a common vulnerability that compromises user data encryption. The study, conducted by researchers from Bowdoin College and Arizona State University, analyzed these apps, which have over 700 million downloads and generate revenue through ads while offering minimal value to users. Notable VPNs included in the study are Tetra VPN, VPN PotatoVPN, and VPN Proxy Master. These applications may mislead users into thinking they have diverse options, but they provide a uniform experience. Additionally, there are concerns about potential vulnerabilities that could expose private data and possible ties to China, a country known for weak privacy protections. The examined VPNs include Turbo VPN, VPN Monster, Snap VPN, and others. In contrast, established VPNs like Proton VPN and NordVPN are noted for their reliability and security.
Tech Optimizer
August 7, 2025
Attackers have been using the ThrottleStop.sys driver to disable antivirus software in compromised networks since October 2024. This driver, designed for CPU throttling, allows malware to gain kernel-level memory access and terminate security processes. Initial access is typically gained through stolen RDP credentials or brute-forced administrative accounts, enabling the deployment of the AV killer alongside ransomware like MedusaLocker. Once inside, attackers extract additional user credentials using tools like Mimikatz and move laterally with Pass-the-Hash techniques. They upload two key components, ThrottleBlood.sys (the renamed driver) and All.exe (the AV killer), to user directories. The malware effectively disables Windows Defender and other endpoint protections, leading to severe data encryption in industries with exposed RDP endpoints, particularly affecting victims in Brazil, Ukraine, Kazakhstan, Belarus, and Russia. Securelist analysts noted that traditional self-defense features in Kaspersky products can counter this AV killer, but many organizations still rely on less effective solutions. The malware exploits two vulnerable IOCTL functions in the ThrottleStop.sys driver, allowing arbitrary memory reads and writes. It uses a loop to match and terminate antivirus processes by invoking kernel functions. The malware avoids detection by restoring original kernel bytes after execution. This situation highlights the need for improved driver integrity monitoring and robust security strategies.
Search