Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 41 to 60 of 962    Older >>
 

The Proliferation of Roles

Using roles for security is a best practice that Steve Jones espouses.  Read more...
By Steve Jones 2016/05/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 57 reads

EXECUTE AS sa

By Steve Jones 2016/04/27 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,371 reads

Track Your Consultants

It's possible to perform a man-in-the-middle attack against SQL Server. Steve Jones notes you should be aware these attacks could take place inside of your network.  Read more...
By Steve Jones 2016/03/29 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 59 reads

Row Level Security Updates

By Steve Jones 2016/03/28 | Category: row-level security (rls)
Rating: (not yet rated) |  Discuss |   Briefcase | 1,208 reads

The One 'Security' Feature in Oracle You Probably Shouldn't Use

Oracle offers a number of security-related settings, but one could definitely create more harm than good. David Fitzjarrell looks at which parameter that is, and why.  Read more...
By Additional Articles 2016/03/24 | Source: Database Journal | Category: oracle
Rating: (not yet rated)  Rate this |   Briefcase | 4,851 reads

RLS Filters

By Steve Jones 2016/03/17 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,034 reads

SQL Server 2016: The Data Protection Version

Today Steve Jones looks at the security enhancements in SQL Server 2016  Read more...
By Steve Jones 2016/02/24 | Source: SQLServerCentral.com | Category: sql server 2016
Rating: (not yet rated) |  Discuss |   Briefcase | 50 reads

Orphaned login report for all databases

Running the sp_change_users_login @Action=Report against all databases with a simple cursor wrapped around it.  Read more...
By Edward Pochinski 2016/02/23 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 919 reads

SQL Authentication Via AD Groups Part II: Who has what access?

In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.  Read more...
By John F. Tamburo 2016/02/18 | Source: SQLServerCentral.com | Category: active directory
Rating: |  Discuss |   Briefcase | 3,547 reads

Forcing Strong Passwords

Passwords are always a challenge, but are bad passwords the users' fault? Steve Jones has a few thoughts.  Read more...
By Steve Jones 2016/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 100 reads

Reasonable Timeframes

Steve Jones talks about the timeframes for updating and fixing security problems in applications.  Read more...
By Steve Jones 2016/02/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 81 reads

REVERT

By Steve Jones 2016/02/11 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,285 reads

The Digital Woes of Public Records

Public records have been open in the past, but today's digital access might mean problems.  Read more...
By Steve Jones 2016/02/09 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 98 reads

Enabling TDE on Databases in an AlwaysOn Scenario

Enabling Transparent Data Encryption on Databases in Always On Scenario  Read more...
By Sanjiv Doshetty 2016/02/09 | Source: SQLServerCentral.com | Category: always on
Rating: |  Discuss |   Briefcase | 2,143 reads

Microsoft Survey on Backup and Security

Microsoft is looking for some people to talk to for ~20 minutes via phone/Skype and as a thank you for sharing, will provide a $10 Amazon gift card after the call.  Read more...
By Press Release 2016/02/05 | Source: SQLServerCentral.com | Category: backup and restore
Rating: (not yet rated) |  Discuss |   Briefcase | 395 reads

CONNECTing to SQL Server

By Steve Jones 2016/02/03 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,342 reads

Maybe Security is Harder than Rocket Science

It's hard to build strong security over time, but it's worth the effort. Steve Jones notes that even smart people have problems implementing strong security.  Read more...
By Steve Jones 2016/02/02 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 106 reads

SQL Server System Audit Report

Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.  Read more...
By Rudy Panigas 2016/02/02 | Source: SQLServerCentral.com | Category: audit
Rating: |  Discuss |   Briefcase | 3,564 reads

EXECUTE AS procedures

By Steve Jones 2016/02/01 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,529 reads

The security scheme

By Steve Jones 2016/01/26 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,384 reads
<< Newer    Items 41 to 60 of 962    Older >>
 
Tags
editorial (160)    
sql server 7 (105)    
administration (73)    
sql server 2005 (56)    
blogs (53)    
encryption (45)    
strategies (40)    
t-sql (38)    
editorial - ipod (25)    
editorial - wmv (25)    
permissions (25)    
editorial - mp3 (24)    
auditing (23)    
logins (21)    
backup and restore (15)    
miscellaneous (15)    
sql server 2008 (15)    
passwords (14)    
transparent data encryption (tde) (13)    
roles (12)    
programming (11)    
sql injection (11)    
sql server 6.5 (11)    
stored procedures (10)    
configuring (9)    
grant (9)    
reporting services (ssrs) (9)    
software development (9)    
database design (8)    
friday poll (8)    
role (8)    
best and worst practices (7)    
database weekly (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
active directory (6)    
database roles (6)    
database security (6)    
stairway series (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
users (5)    
worst practices (5)    
always encrypted (4)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
row-level security (rls) (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
best practices (3)    
certificates (3)    
cloud computing (3)    
ddl triggers (3)    
deny (3)    
development (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
agent jobs (2)    
central management server (cms) (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
devops (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server 2016 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always on (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure (1)    
azure sql database (1)    
backup and recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
dbcc (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
integrated security. (1)    
is_member() (1)    
job (1)    
linked servers (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)