Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

MongoHQ Adds New Security Features in Response to Breach

After experiencing an attack last year that exposed customer accounts and database instances at cloud-based database service MongoHQ, the company on Tuesday said that it has added new security features, in

After experiencing an attack last year that exposed customer accounts and database instances at cloud-based database service MongoHQ, the company on Tuesday said that it has added new security features, including the ability for customers to control and see who accesses their account, along with two-factor authentication and security auditing tools.

In October 2013, the database hosting company discovered that attackers had gained access to an internal, employee-facing support application that resulted in customer accounts and database instances being exposed. One tool accessed by the attacker(s) let MongoHQ support staff “impersonate” to access to a web interface as if they were a logged in as a customer.

“We’re excited to announce these new security features today and highlight the steps we’ve taken to help our customers manage their security,” said Kurt Mackey, co-founder of MongoHQ.

“This security package provides our customers with the tools needed to better manage and monitor access to their database configuration tools.” “These new security features give MongoHQ’s customers a heightened level of control over access to the application used to manage their database,” the company said in a statement. “Additionally, new open source features address the ongoing issue of security within the cloud and allow MongoHQ to provide enhanced security tools to startups that may not otherwise have access.”

Details of the new security features include:

Security Auditing – A new tool that allows database owners to see any login activity and changes through the MongoHQ web user interface in real time. This provides developers with the ability to oversee who is accessing their account and monitor sensitive application features, allowing them to address suspicious activity early.

Two-Factor Authentication – Allows users to add an extra-layer of security to their login details. In addition, account owners can require two-factor authentication for all users on their account.

Open Source Security Features – As part of the new security package, MongoHQ is releasing their two-factor authentication service as open source to help other startups implement two-factor authentication. The tool, known as Authful, was developed in house and underwent a security audit from Matasano.

Advertisement. Scroll to continue reading.

 Along with the new security features, the company published The MongoHQ Security Handbook, a guide that provides best practices for internal security policy, specifically designed for startups.

MongoHQ offers fully managed end-to-end platform for developers looking to deploy, host and scale MongoDB databases and boasts over 35,000 current users with customers across the world.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.