Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 21 to 40 of 829    Older >>
 

Cloud Storage Security: Are You Doing Your Part?

If the level cloud storage encryption are so high, then why is the cloud security industry experiencing such distrust?  Read more...
By Natalie Lehrer 2014/06/18 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 64 reads

Server Role Membership Validation

Need to know how to verify if a login has server-level access to your SQL Server instance?  Read more...
By Shawn Melton 2014/06/17 | Source: SQLServerCentral.com | Category: server roles
Rating: |  Discuss |   Briefcase | 2,270 reads

How Safe is Cloud Storage?

As more and more companies look to the cloud for their data storage needs, the same questions are being asked over and over again: if a security breech were to occur, who would be responsible and how much of a guarantee could the provider give us that our data would be safe from prying eyes.  Read more...
By Additional Articles 2014/06/17 | Source: Database Journal | Category: cloud
Rating: (not yet rated)  Rate this |   Briefcase | 4,928 reads

I Gotta See the Code

By Andy Warren 2014/06/16 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,764 reads

Stairway to SQL Server Security Level 1: Overview of SQL Server Security

The ubiquity of databases and the potentially valuable information stored in them makes them attractive targets for people who want to steal data or harm its owner by tampering with it. Making sure that your data is secure is a critical part of configuring SQL Server and developing applications that use it to store data.  Read more...
By Don Kiely 2014/06/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 4,782 reads

Access Granted or Not?

By Andy Warren 2014/06/03 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,858 reads

Drop Me? No, I Don't Think So

By Andy Warren 2014/05/14 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 2,037 reads

The Danger of Algorithms

What problems occur because of the algorithm chosen to generate data? A new report says that social security numbers in the US can be predicted. Steve Jones has a few warnings about what algoriothms you choose.  Read more...
By Steve Jones 2014/04/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 303 reads

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,738 reads

If or When?

Are data breaches a question of if they will happen to you or when will they happen to you?  Read more...
By Steve Jones 2014/04/10 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 148 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,348 reads

Data Security Policies

Does your organization have policies around data security? Perhaps they should, or perhaps you should ask for some to be created and education available for users.  Read more...
By Steve Jones 2014/04/07 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 105 reads

Get the all user and their server role

The script give you the list of all users and their respective Server roles  Read more...
By Mitesh Oswal 2014/04/02 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,177 reads

Default schema

By Anoo S Pillai 2014/03/31 | Category: schema
Rating: (not yet rated) |  Discuss |   Briefcase | 1,822 reads

Can't See The Forest For the Logins

By Andy Warren 2014/03/28 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 1,779 reads

The Unusable User

By Andy Warren 2014/03/26 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 1,968 reads

The Endless Upgrade Cycle

Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.  Read more...
By Steve Jones 2014/03/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 102 reads

Members of windows group

By Yogeshwar Phull 2014/03/13 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,623 reads

Schema & Renaming Fun

By Andy Warren 2014/03/12 | Category: schema
Rating: (not yet rated) |  Discuss |   Briefcase | 1,751 reads

View My Definition

By Andy Warren 2014/03/07 | Category: roles
Rating: (not yet rated) |  Discuss |   Briefcase | 1,786 reads
<< Newer    Items 21 to 40 of 829    Older >>
 
Tags
editorial (119)    
sql server 7 (105)    
administration (66)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (34)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (20)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
backup / restore (11)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
sql injection (9)    
database design (8)    
role (8)    
roles (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory (2)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
stairway series (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data security (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)