SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

   Items 1 to 20 of 681    Older >>
 

Serious Hacking

The biggest government hack ever occurred recently. At least until the next one happens.  Read more...
By Steve Jones 2019/03/19 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 252 reads

Introduction to SQL Server Security — Part 3

SQL Server supports partially contained databases. This gives you the option of adding database users with a password inside the database. This makes the database easier to move to another instance or participate in an Always On Availability Group. In this article, Robert Sheldon explains how to work with users in contained databases.  Read more...
By Additional Articles 2019/03/14 | Source: SimpleTalk | Category: data protection
Rating: (not yet rated)  Rate this |   Briefcase | 2,693 reads

Schema Security

This week Steve is wondering about the use of schemas for security or other purposes.  Read more...
By Steve Jones 2019/03/01 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 40 reads

The Employee Target

Will employee data become a target of hackers? It's likely more a movie plot than reality, at least, Steve hopes so.  Read more...
By Steve Jones 2019/02/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 46 reads

Introduction to SQL Server Security — Part 2

In this article, the second in the series, Robert Sheldon demonstrates how to manage the SQL Server security with granting permissions to users, logins, and groups.  Read more...
By Additional Articles 2019/02/25 | Source: SimpleTalk | Category: sql server
Rating: (not yet rated)  Rate this |   Briefcase | 2,111 reads

Treat All Sensitive Data as Important

No matter what the reason you have sensitive information, you need to treat it carefully.  Read more...
By Steve Jones 2019/02/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 29 reads

Default Security

Ensure that when you set up a new system, you include some sort of security.  Read more...
By Steve Jones 2019/02/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 36 reads

On Quickly Investigating a SQL Monitor Custom Security Alert

Phil Factor offers a clever way to report on an intrusion, with a query that shows a full ‘narrative’ description of all the changes that have been detected by SQL Monitor. Using the results, the DBA can very quickly investigate the sequence of unusual events.   Read more...
By 2019/02/20 | Source: Redgate | Category: sql monitor
Rating: (not yet rated)  Rate this |   Briefcase | 3,406 reads

Complex Constrained Security

Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.  Read more...
By Steve Jones 2019/02/06 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 35 reads

Cyber Insecurity in Pakistan

Journalist Alamzeb Khan discusses recent security breaches in Pakistan that have affected millions of people and accounts.  Read more...
By Additional Articles 2019/01/31 | Source: SimpleTalk | Category: cybersecurity
Rating: (not yet rated)  Rate this |   Briefcase | 3,548 reads

The Justification Database

Having a good process for managing security is important, but how many of us enforce that?  Read more...
By Steve Jones 2019/01/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 51 reads

Do you have a security to-do list?

Security is important, and Steve wonders if any of us have a list of things we do that improve security.  Read more...
By Steve Jones 2019/01/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 49 reads

Workplace Encounter: Effects of TLS 1.2

In this article we share a recent experience we had with implementing TLS 1.2 ONLY support on our databases and particularly with respect to its effect on Transaction Log Shipping sessions.  Read more...
By Kenneth Igiri 2019/01/03 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 778 reads

Review Minimum SQL Server Security Practices

In this tip we look at different things you should consider when developing your database systems to ensure you are also thinking about security best practices as well.  Read more...
By Additional Articles 2019/01/02 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,786 reads

Spend More on Security

With a data breach at Marriot, there is a call from one person for companies to spend more on security.  Read more...
By Steve Jones 2018/12/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 21 reads

Get Patched If Not Supported

Many organizations that run older versions of SQL Server are not patched.  Read more...
By Steve Jones 2018/12/19 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Trust But Verify

Malware slips into packages, and it could slip into SQL code in the future.  Read more...
By Steve Jones 2018/12/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Lax Security is Harmful for Employment

Data breaches do more than harm an organization. There's a human cost.  Read more...
By Steve Jones 2018/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 56 reads

Another Reason to Care About Security

Just before the US holiday, Steve wants you to think about the security of our systems.  Read more...
By Steve Jones 2018/11/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 38 reads

Always On - Endpoint Ownership

Whoever creates an AlwaysOn group is, by default, the owner of the endpoint. This is generally not a problem…unless that person leaves the company and you need to delete the login.  Read more...
By Ginger Keys Daniel 2018/10/25 | Source: SQLServerCentral.com | Category: always on
Rating: |  Discuss |   Briefcase | 545 reads
   Items 1 to 20 of 681    Older >>