Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 41 to 60 of 932    Older >>
 

Liberating the DBA from SQL Authentication with AD Groups

It's 15 years after the beginning of the century. Time to eliminate the security exposure of SQL logins, and implement integrated security. Active Directory Groups make this easy for the DBA.  Read more...
By John F. Tamburo 2015/12/21 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,198 reads

The $90,000 Laptop

The payment for a lost laptop: $90,000.  Read more...
By Steve Jones 2015/12/14 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 294 reads

Always Encrypted

By Dathuraj Pasarge 2015/12/09 | Category: always encrypted
Rating: (not yet rated) |  Discuss |   Briefcase | 1,167 reads

SMKs, DMKs, Certificates for TDE and Encrypted Backups

This article details SMKs, DMKs and certificates in SQL Server as they relate to Transparent Data Encryption and Encrypted Backups.  Read more...
By Perry Whittle 2015/12/09 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,932 reads

The Auditor Attack Vector

Steve Jones shares a story about losing data today.  Read more...
By Steve Jones 2015/12/01 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 126 reads

The Biggest Data Breach (For Now)

JP Morgan suffers the largest data breach for a financial institution, but Steve Jones doesn't think this record will stand for long.  Read more...
By Steve Jones 2015/11/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 172 reads

Secret Software Security

The move to limit disclosure of vulnerabilities continues, with potential issues for many of us.  Read more...
By Steve Jones 2015/11/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 93 reads

SQL Injection - The Revenge

As yet more personal details are spilled by preventable security lapses, what's   Read more...
By Dave Convery 2015/11/02 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 213 reads

Security Queries: Database-level

A set of queries which attempt to gather as much security-related information on a single database as possible.  Read more...
By Greg Drake 2015/10/30 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 3,267 reads

The Dangers of Travel

As data professionals, we might carry lots of information with us that relates to our organization. Will we get caught up in government issues as we cross borders?  Read more...
By Steve Jones 2015/10/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 185 reads

Serious Hacking

The biggest government hack ever occurred recently. At least until the next one happens.  Read more...
By Steve Jones 2015/10/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 219 reads

Find Permission Changes In The Default Trace

Learn how to find who has changed permissions from the default trace   Read more...
By Lori Brown 2015/10/13 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 1,964 reads

Storing Passwords in a Secure Way in a SQL Server Database

Measures such as using special characters and numbers within a password are of little use to security if passwords are then stored in an insecure way. Sergey Gigoyan explains how to encrypt and store passwords in a SQL Server database.  Read more...
By Additional Articles 2015/10/09 | Source: MSSQLTips.com | Category: storing passwords
Rating: (not yet rated)  Rate this |   Briefcase | 5,139 reads

Everyone is a Target

Today Steve Jones looks at the targeted attacks by hackers against individual security professionals.  Read more...
By Steve Jones 2015/09/23 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 118 reads

Generate Login Script(2008R2 And Older)

Generate Script from Logins of Sql Server to recreate in another instance  Read more...
By Bahram Shayan 2015/08/25 | Source: SQLServerCentral.com | Category: logins
Rating: |  Discuss |   Briefcase | 1,650 reads

Changing roles

By Steve Jones 2015/08/18 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,369 reads

Cloud Security Issues

The cloud is always going to be a challenge for security, but is it harder or easier than on premises? Steve Jones has a few comments.  Read more...
By Steve Jones 2015/08/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 130 reads

Stairway to SQL Server Security Level 10: Row-Level Security

Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.  Read more...
By Don Kiely 2015/07/29 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,490 reads

Azure SQL Database Security Features

The Microsoft Azure platform is evolving fast. Azure SQL Database is riding high on the cloud wave with new features enabled at a fast pace. In this article, Kun Cheng shares a few Azure SQL Database security features that could help developers and DBAs develop and manage a secure SQL Database solution.  Read more...
By Additional Articles 2015/07/17 | Source: SQLCAT | Category: azure sql database
Rating: (not yet rated)  Rate this |   Briefcase | 5,559 reads

MS15-058: Vulnerabilities in SQL Server could allow remote code execution

A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.  Read more...
By Press Release 2015/07/15 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 5,400 reads
<< Newer    Items 41 to 60 of 932    Older >>
 
Tags
editorial (150)    
sql server 7 (105)    
administration (70)    
sql server 2005 (56)    
blogs (53)    
encryption (43)    
strategies (40)    
t-sql (36)    
editorial - ipod (25)    
editorial - wmv (25)    
permissions (25)    
editorial - mp3 (24)    
auditing (22)    
logins (20)    
miscellaneous (15)    
sql server 2008 (15)    
backup and restore (14)    
passwords (13)    
transparent data encryption (tde) (13)    
roles (12)    
programming (11)    
sql injection (11)    
sql server 6.5 (11)    
configuring (9)    
grant (9)    
reporting services (ssrs) (9)    
software development (9)    
database design (8)    
role (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
active directory (6)    
database roles (6)    
database security (6)    
database weekly (6)    
stairway series (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
users (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
row-level security (rls) (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
best practices (3)    
certificates (3)    
cloud computing (3)    
ddl triggers (3)    
deny (3)    
development (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
agent jobs (2)    
always encrypted (2)    
central management server (cms) (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server 2016 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
alwayson (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure (1)    
azure sql database (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbcc (1)    
ddl (1)    
default trace (1)    
devops (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic data masking (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
integrated security. (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)