SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 1012    Older >>
 

Being Careful with Schema Ownership

When you create a schema, you might accidentally make yourself the owner, which can cause issues later. Learn how to ensure that your schemas aren't owned by transient employees.  Read more...
By Steve Jones 2018/10/15 | Source: SQLServerCentral.com | Category: schema
Rating: |  Discuss |   Briefcase | 725 reads

SQL Server on Linux and AD

By Steve Jones 2018/10/05 | Category: sql server on linux
Rating: (not yet rated) |  Discuss |   Briefcase | 578 reads

Security, Compliance, Data Ethics, and Breaking the “Not My Job” Mindset

Security, compliance, and data ethics are related concepts that everyone who works with software should know about, from the help desk to the C-level office… but almost everyone thinks that worrying about these things is someone else’s problem.  Read more...
By Additional Articles 2018/09/27 | Source: SimpleTalk | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 3,371 reads

Protecting Our Stream of Data

We can't protect against all hacks, but can we prove they weren't our fault?  Read more...
By Steve Jones 2018/08/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 30 reads

The Weakest Link

Your security depends on the security of your business partners.  Read more...
By Steve Jones 2018/08/23 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 43 reads

Destroying Data

This week Steve talks about services that are available to destroy your data.  Read more...
By Steve Jones 2018/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 28 reads

The conflict between data protection and DevOps

Data breaches are the new normal – according to the Identity Theft Resource Center there were nearly 1,600 of them in 2017 in the US alone, exposing 179 million records. No wonder companies want to keep data confidential and protected. At the same time, however, the increasing pace of business means developers need to create and release code in much shorter DevOps timescales. Steve Jones discussed ways to solve this conflict  Read more...
By 2018/08/13 | Source: Redgate | Category: data protection
Rating: (not yet rated)  Rate this |   Briefcase | 2,348 reads

SQL Authentication Via AD Groups Part II: Who has what access?

In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.  Read more...
By John F. Tamburo 2018/08/03 (first published: 2016/02/18) | Source: SQLServerCentral.com | Category: active directory
Rating: |  Discuss |   Briefcase | 4,703 reads

Have You Been Hacked?

Security is a big deal, and Steve Jones wonders if most data professionals would be aware that they had been hacked.  Read more...
By Steve Jones 2018/07/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 205 reads

Granting CONTROL permission on a database

By Steve Jones 2018/07/17 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 743 reads

Setting Permissions to Drop a Database

Learn which permissions are required to drop a database and see a test to show that these apply.  Read more...
By Steve Jones 2018/07/17 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 466 reads

Principles of Data Protection

Protecting data in SQL Server is not as simple as setting a few properties. While there are great security features in SQL Server, such as Transparent Data Encryption, production data may end up in places throughout the organization. In this article, Brian Kelley talks about the best ways to secure data using the concept of least privilege.  Read more...
By Additional Articles 2018/07/12 | Source: SimpleTalk | Category: data privacy and protection
Rating: (not yet rated)  Rate this |   Briefcase | 2,811 reads

The Opportunistic Hacker

Sometimes the crimes of opportunity might be the worst ones for our data.  Read more...
By Steve Jones 2018/06/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 256 reads

Detecting Data Breaches

Data breaches make the news on an almost daily basis. There is no turning back, however, as we are firmly entrenched in this digital way of life. Brian Kelley discusses some of the reasons data breaches occur and what we can do to prevent them.  Read more...
By Additional Articles 2018/06/26 | Source: SimpleTalk | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,992 reads

Enable FIPS 140-2 Compliance in SQL Server

What is FIPS? How do I use it? What is going to break if I do use it?  Read more...
By Jason Ash 2018/06/25 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 739 reads

Introduction to Azure Cosmos DB Security

When analyzing security-related challenges, it is important to note that they encompass several distinct but interrelated technologies. In addition, when dealing with data services, it is also necessary to distinguish between the data plane, facilitating access to the underlying content and the management plane, which allows for delegation of administrative tasks. In this article, Marcin Policht explores how these concepts apply to the Azure Cosmos DB offering.  Read more...
By Additional Articles 2018/06/05 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,426 reads

Solving the Target Principal Name is Incorrect

One small point to note when we receive the below error while connecting SQL server: The target principal name is incorrect. Cannot generate sspi context  Read more...
By Raghavender Chavva 2018/05/31 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 663 reads

SQL Server System Audit Report

Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.  Read more...
By Rudy Panigas 2018/05/25 (first published: 2016/02/02) | Source: SQLServerCentral.com | Category: audit
Rating: |  Discuss |   Briefcase | 4,762 reads

Login restriction from selected applications and users

It will help to DBA for restrict the SQL Users login from selected applications programs and track there logins with Host name and other details  Read more...
Rating: |  Discuss |   Briefcase | 326 reads

Row-Level Security Predicate Functions - Level 2 of the Stairway to Row Level Security

In this level, we dive deeper into predicates and the various ways to structure them in an RLS environment.  Read more...
By Steve Jones 2018/04/11 | Source: SQLServerCentral.com | Category: row-level security (rls)
Rating: |  Discuss |   Briefcase | 818 reads
   Items 1 to 20 of 1012    Older >>
 
Tags
editorial (173)    
sql server 7 (105)    
administration (78)    
sql server 2005 (56)    
blogs (53)    
encryption (51)    
strategies (40)    
t-sql (38)    
permissions (28)    
auditing (25)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
logins (22)    
transparent data encryption (tde) (16)    
backup and restore (15)    
miscellaneous (15)    
passwords (15)    
sql server 2008 (15)    
roles (12)    
programming (11)    
reporting services (ssrs) (11)    
sql injection (11)    
sql server 6.5 (11)    
database weekly (10)    
stored procedures (10)    
configuring (9)    
grant (9)    
software development (9)    
database design (8)    
friday poll (8)    
role (8)    
sql server (8)    
stairway series (8)    
active directory (7)    
best and worst practices (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
users (6)    
advanced querying (5)    
always encrypted (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
row-level security (rls) (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
devops (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
agent jobs (3)    
best practices (3)    
certificates (3)    
cloud computing (3)    
compliance (3)    
ddl trigger (3)    
deny (3)    
development (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2016 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
azure (2)    
central management server (cms) (2)    
comparison (2)    
dac (2)    
data protection (2)    
database master key (dmk) (2)    
database principals (2)    
databases (2)    
dbcc (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
read only (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always on (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure cosmos db (1)    
azure sql database (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
cloud hosting (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control permission (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data (1)    
data driven subscriptions (1)    
data encryption (1)    
data mining (1)    
data privacy and protection (1)    
data security (1)    
database (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
drop database (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
integrated security. (1)    
is_member() (1)    
linked servers (1)    
list (1)    
logging (1)    
login (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
provisioning (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
row level security (rls) (1)    
sa (1)    
sanpshot (1)    
schema (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql authentication (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server on linux (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
survey (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
warehouse (1)    
windows (1)    
xp_logininfo (1)