SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 997    Older >>
 

Introduction to Azure Cosmos DB Security

When analyzing security-related challenges, it is important to note that they encompass several distinct but interrelated technologies. In addition, when dealing with data services, it is also necessary to distinguish between the data plane, facilitating access to the underlying content and the management plane, which allows for delegation of administrative tasks. In this article, Marcin Policht explores how these concepts apply to the Azure Cosmos DB offering.  Read more...
By Additional Articles 2018/06/05 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,272 reads

Solving the Target Principal Name is Incorrect

One small point to note when we receive the below error while connecting SQL server: The target principal name is incorrect. Cannot generate sspi context  Read more...
By Raghavender Chavva 2018/05/31 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 631 reads

SQL Server System Audit Report

Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.  Read more...
By Rudy Panigas 2018/05/25 (first published: 2016/02/02) | Source: SQLServerCentral.com | Category: audit
Rating: |  Discuss |   Briefcase | 4,664 reads

Login restriction from selected applications and users

It will help to DBA for restrict the SQL Users login from selected applications programs and track there logins with Host name and other details  Read more...
Rating: |  Discuss |   Briefcase | 282 reads

Row-Level Security Predicate Functions - Level 2 of the Stairway to Row Level Security

In this level, we dive deeper into predicates and the various ways to structure them in an RLS environment.  Read more...
By Steve Jones 2018/04/11 | Source: SQLServerCentral.com | Category: row-level security (rls)
Rating: |  Discuss |   Briefcase | 733 reads

Disable Guest

By Steve Jones 2018/03/30 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 783 reads

SQL Server Authenticated Users, why are we still using them?

AD Authentication in SQL Server has been around for a long time, so why do we still use SQL Authentication?  Read more...
By Ben Kubicek 2018/03/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 82 reads

Is Security Catching On?

A new poll shows more people want security than convenience.  Read more...
By Steve Jones 2018/03/09 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 34 reads

Questions About Data Breaches that You Were Too Shy to Ask

News reports about data breaches are common occurrences. Even the companies that exist to keep our data safe are not immune. William Brewer answers the question about data breaches that you may be too shy to ask.  Read more...
By Additional Articles 2018/03/07 | Source: SimpleTalk | Category: security
Rating:  Rate this |   Briefcase | 3,015 reads

Elevation of Privileges

The elevation of privileges is a large security problem and Steve Jones discusses his fears. Would you know if someone successfully attacked your instance?  Read more...
By Steve Jones 2018/03/01 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 151 reads

Guest

By Steve Jones 2018/02/16 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 794 reads

Liberating the DBA from SQL Authentication with AD Groups

It's 15 years after the beginning of the century. Time to eliminate the security exposure of SQL logins, and implement integrated security. Active Directory Groups make this easy for the DBA.  Read more...
By John F. Tamburo 2018/02/02 (first published: 2015/12/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,333 reads

Viewing Plans

By Steve Jones 2018/02/01 | Category: permissions
Rating: (not yet rated) |  Discuss |   Briefcase | 822 reads

An Introduction: Level 1 of the Stairway to Row-Level Security

Learn the basics of how Row-Level Security works in SQL Server.  Read more...
By Steve Jones 2017/12/28 | Source: SQLServerCentral.com | Category: row level security (rls)
Rating: |  Discuss |   Briefcase | 1,119 reads

Securing Reporting Services Reports

Learn how you can get the userid of someone connected to Reporting Services and use that information to determine if they can view the report.  Read more...
By Mohamed Idttalbe 2017/12/22 (first published: 2010/05/18) | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 7,904 reads

Data Security Policies

Does your organization have policies around data security? Perhaps they should, or perhaps you should ask for some to be created and education available for users.  Read more...
By Steve Jones 2017/12/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 136 reads

Read Only access to all databases to a user in a SQL Server Instance

Script to grant a SQL a user read-only access to all the databases in Server instance except the system databases and -- the Log shipped databases(if any : secondary :read-only)   Read more...
By Gaurav Deep Juneja 2017/11/22 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 319 reads

We Really Need Better Security

Some disturbing security issues reported this week.  Read more...
By Steve Jones 2017/11/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 55 reads

Always Encrypted Permissions

By Steve Jones 2017/09/28 | Category: always encrypted
Rating: (not yet rated) |  Discuss |   Briefcase | 783 reads
   Items 1 to 20 of 997    Older >>
 
Tags
editorial (170)    
sql server 7 (105)    
administration (78)    
sql server 2005 (56)    
blogs (53)    
encryption (50)    
strategies (40)    
t-sql (38)    
permissions (26)    
editorial - ipod (25)    
editorial - wmv (25)    
auditing (24)    
editorial - mp3 (24)    
logins (22)    
transparent data encryption (tde) (16)    
miscellaneous (15)    
passwords (15)    
sql server 2008 (15)    
backup and restore (14)    
roles (12)    
programming (11)    
reporting services (ssrs) (11)    
sql injection (11)    
sql server 6.5 (11)    
stored procedures (10)    
configuring (9)    
database weekly (9)    
grant (9)    
software development (9)    
database design (8)    
friday poll (8)    
role (8)    
stairway series (8)    
best and worst practices (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
active directory (6)    
database roles (6)    
database security (6)    
users (6)    
advanced querying (5)    
always encrypted (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
row-level security (rls) (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
agent jobs (3)    
best practices (3)    
certificates (3)    
cloud computing (3)    
ddl triggers (3)    
deny (3)    
development (3)    
devops (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2016 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
azure (2)    
central management server (cms) (2)    
comparison (2)    
compliance (2)    
dac (2)    
database master key (dmk) (2)    
database principals (2)    
databases (2)    
dbcc (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
read only (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always on (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure cosmos db (1)    
azure sql database (1)    
backup and recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
cloud hosting (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data (1)    
data driven subscriptions (1)    
data mining (1)    
data protection (1)    
data security (1)    
database (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
integrated security. (1)    
is_member() (1)    
linked servers (1)    
list (1)    
login (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
row level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql authentication (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
survey (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
warehouse (1)    
windows (1)    
xp_logininfo (1)