SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 978    Older >>
 

Using Database Master Keys in SQL Server

Learn the basics of Database Master Keys and how you can use them in SQL Server.  Read more...
By Steve Jones 2017/08/15 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 1,082 reads

Managing Passwords

This week Troy Hunt provides updated password guidelines, but Steve Jones notes many of us are in the middle, both managing and dealing with passwords.   Read more...
By Steve Jones 2017/07/31 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 61 reads

Azure DWH part 12: Permissions, roles, logins and users

In this article we will show some common roles and queries related to Azure SQL Data Warehouse.  Read more...
By Daniel Calbimonte 2017/07/25 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 369 reads

Advancing Security

Microsoft is working to provide better patches for us.  Read more...
By Steve Jones 2017/07/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 45 reads

The Poor State of Secure Coding

The way we code isn't necessarily getting better.  Read more...
By Steve Jones 2017/06/06 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 87 reads

Consider the Downside

Steve Jones asks software developers to consider the issues we may have with lax internal security.  Read more...
By Steve Jones 2017/06/01 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 78 reads

Only Use My Application

By Steve Jones 2017/05/29 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,038 reads

Audio Attacks

We will start to deal with more and more types of data. Steve Jones worries about the possibility of hacking.  Read more...
By Steve Jones 2017/05/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 56 reads

The Secret Password

The secret passwords we store in systems might be secure from discovery, but are they secure from use?  Read more...
By Steve Jones 2017/05/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 70 reads

The Secure SSRS Server

By Steve Jones 2017/04/11 | Category: reporting services (ssrs)
Rating: (not yet rated) |  Discuss |   Briefcase | 947 reads

Fix Orphan Users for All databases

Fix orphan database users on all user databases.  Read more...
Rating: |  Discuss |   Briefcase | 662 reads

I Hate To Send This Email

Steve Jones wonders how many of us have had to send, or will have to send this email.  Read more...
By Steve Jones 2017/03/23 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 149 reads

Securing SSRS

By Steve Jones 2017/03/09 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 947 reads

Database TDE

Rating: (not yet rated) |  Discuss |   Briefcase | 871 reads

DBCC PAGE

By Henrico Bekker 2017/02/27 | Category: dbcc
Rating: (not yet rated) |  Discuss |   Briefcase | 891 reads

Changing Passwords

By Steve Jones 2017/02/16 | Category: linked servers
Rating: (not yet rated) |  Discuss |   Briefcase | 987 reads

Why Devops? For Better Security

DevOps is supposed to help us build better software, faster. Steve Jones looks at one of the other benefits: security.  Read more...
By Steve Jones 2017/02/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 67 reads

BULK ADMIN

By Steve Jones 2017/02/06 | Category: bulkadmin
Rating: (not yet rated) |  Discuss |   Briefcase | 937 reads

Changing Linked Server Passwords

How to article on changing passwords for linked servers via TSQL and SSMS.  Read more...
By Thomas Liddle 2017/01/26 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 1,565 reads
   Items 1 to 20 of 978    Older >>
 
Tags
editorial (167)    
sql server 7 (105)    
administration (74)    
sql server 2005 (56)    
blogs (53)    
encryption (48)    
strategies (40)    
t-sql (38)    
editorial - ipod (25)    
editorial - wmv (25)    
permissions (25)    
editorial - mp3 (24)    
auditing (23)    
logins (21)    
backup and restore (15)    
miscellaneous (15)    
passwords (15)    
sql server 2008 (15)    
transparent data encryption (tde) (15)    
roles (12)    
programming (11)    
reporting services (ssrs) (11)    
sql injection (11)    
sql server 6.5 (11)    
stored procedures (10)    
configuring (9)    
grant (9)    
software development (9)    
database design (8)    
database weekly (8)    
friday poll (8)    
role (8)    
best and worst practices (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
active directory (6)    
database roles (6)    
database security (6)    
stairway series (6)    
users (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
always encrypted (4)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
row-level security (rls) (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
agent jobs (3)    
best practices (3)    
certificates (3)    
cloud computing (3)    
ddl triggers (3)    
deny (3)    
development (3)    
devops (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2016 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
azure (2)    
central management server (cms) (2)    
comparison (2)    
compliance (2)    
dac (2)    
database master key (dmk) (2)    
database principals (2)    
databases (2)    
dbcc (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always on (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure sql database (1)    
backup and recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data (1)    
data driven (1)    
data mining (1)    
data security (1)    
database (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
integrated security. (1)    
is_member() (1)    
linked servers (1)    
list (1)    
login (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
warehouse (1)    
windows (1)    
xp_logininfo (1)