Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 41 to 60 of 924    Older >>
 

Security Queries: Database-level

A set of queries which attempt to gather as much security-related information on a single database as possible.  Read more...
By Greg Drake 2015/10/30 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 3,251 reads

The Dangers of Travel

As data professionals, we might carry lots of information with us that relates to our organization. Will we get caught up in government issues as we cross borders?  Read more...
By Steve Jones 2015/10/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 185 reads

Serious Hacking

The biggest government hack ever occurred recently. At least until the next one happens.  Read more...
By Steve Jones 2015/10/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 219 reads

Find Permission Changes In The Default Trace

Learn how to find who has changed permissions from the default trace   Read more...
By Lori Brown 2015/10/13 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 1,950 reads

Storing Passwords in a Secure Way in a SQL Server Database

Measures such as using special characters and numbers within a password are of little use to security if passwords are then stored in an insecure way. Sergey Gigoyan explains how to encrypt and store passwords in a SQL Server database.  Read more...
By Additional Articles 2015/10/09 | Source: MSSQLTips.com | Category: storing passwords
Rating: (not yet rated)  Rate this |   Briefcase | 5,075 reads

Everyone is a Target

Today Steve Jones looks at the targeted attacks by hackers against individual security professionals.  Read more...
By Steve Jones 2015/09/23 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 118 reads

Generate Login Script(2008R2 And Older)

Generate Script from Logins of Sql Server to recreate in another instance  Read more...
By Bahram Shayan 2015/08/25 | Source: SQLServerCentral.com | Category: logins
Rating: |  Discuss |   Briefcase | 1,643 reads

Changing roles

By Steve Jones 2015/08/18 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,363 reads

Cloud Security Issues

The cloud is always going to be a challenge for security, but is it harder or easier than on premises? Steve Jones has a few comments.  Read more...
By Steve Jones 2015/08/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 129 reads

Stairway to SQL Server Security Level 10: Row-Level Security

Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.  Read more...
By Don Kiely 2015/07/29 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,456 reads

Azure SQL Database Security Features

The Microsoft Azure platform is evolving fast. Azure SQL Database is riding high on the cloud wave with new features enabled at a fast pace. In this article, Kun Cheng shares a few Azure SQL Database security features that could help developers and DBAs develop and manage a secure SQL Database solution.  Read more...
By Additional Articles 2015/07/17 | Source: SQLCAT | Category: azure sql database
Rating: (not yet rated)  Rate this |   Briefcase | 5,521 reads

MS15-058: Vulnerabilities in SQL Server could allow remote code execution

A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.  Read more...
By Press Release 2015/07/15 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 5,399 reads

Grant User Access to All SQL Server Databases

Consider a situation when you have a large number of databases on your SQL Server, and you are requested to grant user access to all SQL Server databases. How can you grant access to a user for all databases on a SQL Server instance?  Read more...
By Additional Articles 2015/06/30 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,568 reads

Stored Procedures and SQL Injection

Why do stored procedures help with security? In this piece, MVP Brian Kelley explains why SQL Injection and information gathering are hampered with stored procedures.  Read more...
By Brian Kelley 2015/06/12 (first published: 2013/02/18) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 20,257 reads

DBCC InputBuffer Permissions

By Steve Jones 2015/05/29 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,338 reads

Hack Us

A challenge from United intrigues Steve Jones. How many other companies would make a challenge like this?  Read more...
By Steve Jones 2015/05/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 177 reads

Default Endpoint Encryption

By Steve Jones 2015/05/21 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,225 reads

PCI Best Practices Guide for SQL Server DBAs

Tibor Nagy has put together some best practices to help SQL Server DBAs navigate the many different requirements around PCI compliance.  Read more...
By Additional Articles 2015/05/21 | Source: MSSQLTips.com | Category: best practices
Rating: (not yet rated)  Rate this |   Briefcase | 6,422 reads

How to Get SQL Server Security Horribly Wrong

It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.  Read more...
By Additional Articles 2015/05/13 | Source: SimpleTalk | Category: security
Rating:  Rate this |   Briefcase | 8,958 reads

Passively detect attempts to guess passwords

Review the error log for possible brute force or dictionary attacks on your SQL Server instance.  Read more...
By Daniel Brink 2015/05/08 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,405 reads
<< Newer    Items 41 to 60 of 924    Older >>
 
Tags
editorial (146)    
sql server 7 (105)    
administration (70)    
sql server 2005 (56)    
blogs (53)    
encryption (43)    
strategies (40)    
t-sql (36)    
editorial - ipod (25)    
editorial - wmv (25)    
permissions (25)    
editorial - mp3 (24)    
auditing (22)    
logins (20)    
miscellaneous (15)    
sql server 2008 (15)    
backup and restore (14)    
passwords (13)    
transparent data encryption (tde) (13)    
roles (12)    
programming (11)    
sql injection (11)    
sql server 6.5 (11)    
configuring (9)    
reporting services (ssrs) (9)    
software development (9)    
database design (8)    
grant (8)    
role (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
stairway series (6)    
active directory (5)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
users (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
orphaned users (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
best practices (3)    
cloud computing (3)    
ddl triggers (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
row level security (rls) (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
agent jobs (2)    
always encrypted (2)    
central management server (cms) (2)    
certificates (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
deny (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
alwayson (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure (1)    
azure sql database (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbcc (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic data masking (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
row-level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server 2016 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)