SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 1028    Older >>
 

Complex Constrained Security

Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.  Read more...
By Steve Jones 2019/02/06 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 35 reads

Cyber Insecurity in Pakistan

Journalist Alamzeb Khan discusses recent security breaches in Pakistan that have affected millions of people and accounts.  Read more...
By Additional Articles 2019/01/31 | Source: SimpleTalk | Category: cybersecurity
Rating: (not yet rated)  Rate this |   Briefcase | 3,506 reads

The Justification Database

Having a good process for managing security is important, but how many of us enforce that?  Read more...
By Steve Jones 2019/01/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 50 reads

Do you have a security to-do list?

Security is important, and Steve wonders if any of us have a list of things we do that improve security.  Read more...
By Steve Jones 2019/01/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 48 reads

Workplace Encounter: Effects of TLS 1.2

In this article we share a recent experience we had with implementing TLS 1.2 ONLY support on our databases and particularly with respect to its effect on Transaction Log Shipping sessions.  Read more...
By Kenneth Igiri 2019/01/03 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 769 reads

Review Minimum SQL Server Security Practices

In this tip we look at different things you should consider when developing your database systems to ensure you are also thinking about security best practices as well.  Read more...
By Additional Articles 2019/01/02 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,733 reads

Spend More on Security

With a data breach at Marriot, there is a call from one person for companies to spend more on security.  Read more...
By Steve Jones 2018/12/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 21 reads

Get Patched If Not Supported

Many organizations that run older versions of SQL Server are not patched.  Read more...
By Steve Jones 2018/12/19 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Trust But Verify

Malware slips into packages, and it could slip into SQL code in the future.  Read more...
By Steve Jones 2018/12/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Lax Security is Harmful for Employment

Data breaches do more than harm an organization. There's a human cost.  Read more...
By Steve Jones 2018/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 56 reads

Another Reason to Care About Security

Just before the US holiday, Steve wants you to think about the security of our systems.  Read more...
By Steve Jones 2018/11/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 38 reads

Owning Schemas

By Steve Jones 2018/11/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 717 reads

CLR Strict Security

By Steve Jones 2018/10/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 591 reads

Always On - Endpoint Ownership

Whoever creates an AlwaysOn group is, by default, the owner of the endpoint. This is generally not a problem…unless that person leaves the company and you need to delete the login.  Read more...
By Ginger Keys Daniel 2018/10/25 | Source: SQLServerCentral.com | Category: always on
Rating: |  Discuss |   Briefcase | 541 reads

Schema Owners

By Steve Jones 2018/10/22 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 754 reads

Auditing the password changes using LOGIN_CHANGE_PASSWORD_GROUP Server

Auditing the password changes using LOGIN_CHANGE_PASSWORD_GROUP Server Level Audit Group.  Read more...
By Deepak Prasad Sahu 2018/10/18 | Source: SQLServerCentral.com | Category: audit specification
Rating: |  Discuss |   Briefcase | 447 reads

Being Careful with Schema Ownership

When you create a schema, you might accidentally make yourself the owner, which can cause issues later. Learn how to ensure that your schemas aren't owned by transient employees.  Read more...
By Steve Jones 2018/10/15 | Source: SQLServerCentral.com | Category: schema
Rating: |  Discuss |   Briefcase | 942 reads

SQL Server on Linux and AD

By Steve Jones 2018/10/05 | Category: sql server on linux
Rating: (not yet rated) |  Discuss |   Briefcase | 639 reads

Security, Compliance, Data Ethics, and Breaking the “Not My Job” Mindset

Security, compliance, and data ethics are related concepts that everyone who works with software should know about, from the help desk to the C-level office… but almost everyone thinks that worrying about these things is someone else’s problem.  Read more...
By Additional Articles 2018/09/27 | Source: SimpleTalk | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 3,541 reads

Protecting Our Stream of Data

We can't protect against all hacks, but can we prove they weren't our fault?  Read more...
By Steve Jones 2018/08/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 31 reads
   Items 1 to 20 of 1028    Older >>
 
Tags
editorial (181)    
sql server 7 (105)    
administration (78)    
sql server 2005 (56)    
blogs (53)    
encryption (51)    
strategies (40)    
t-sql (38)    
permissions (28)    
auditing (26)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
logins (22)    
transparent data encryption (tde) (16)    
backup and restore (15)    
miscellaneous (15)    
passwords (15)    
sql server 2008 (15)    
roles (12)    
programming (11)    
reporting services (ssrs) (11)    
sql injection (11)    
sql server 6.5 (11)    
stored procedures (11)    
database weekly (10)    
configuring (9)    
friday poll (9)    
grant (9)    
software development (9)    
database design (8)    
role (8)    
sql server (8)    
stairway series (8)    
active directory (7)    
best and worst practices (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
users (6)    
advanced querying (5)    
always encrypted (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
row-level security (rls) (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
devops (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
agent jobs (3)    
best practices (3)    
certificates (3)    
cloud computing (3)    
compliance (3)    
ddl trigger (3)    
deny (3)    
development (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
schema (3)    
service accounts (3)    
service broker (3)    
sql server 2016 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
always on (2)    
azure (2)    
central management server (cms) (2)    
comparison (2)    
dac (2)    
data protection (2)    
database master key (dmk) (2)    
database principals (2)    
databases (2)    
dbcc (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
read only (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
ssl (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
audit specification (1)    
automation (1)    
azure cosmos db (1)    
azure sql database (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
cloud hosting (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control permission (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
cybersecurity (1)    
data (1)    
data driven subscriptions (1)    
data encryption (1)    
data mining (1)    
data privacy and protection (1)    
data security (1)    
database (1)    
database development (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
drop database (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
high availability (ha) (1)    
integrated security. (1)    
is_member() (1)    
linked servers (1)    
list (1)    
log shipping (1)    
log shipping errors (1)    
logging (1)    
login (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
provisioning (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
row level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql authentication (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server on linux (1)    
sql server permissions (1)    
sql spackle (1)    
sqlclr (1)    
sqlrx (1)    
sqlservercentral (1)    
sspi (1)    
storing passwords (1)    
survey (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
tls (1)    
tls 1.2 (1)    
today (1)    
transaction log shipping (1)    
transport layer security (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
warehouse (1)    
windows (1)    
xp_logininfo (1)