SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

   Items 1 to 20 of 671    Older >>
 

The Justification Database

Having a good process for managing security is important, but how many of us enforce that?  Read more...
By Steve Jones 2019/01/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 41 reads

Do you have a security to-do list?

Security is important, and Steve wonders if any of us have a list of things we do that improve security.  Read more...
By Steve Jones 2019/01/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 43 reads

Workplace Encounter: Effects of TLS 1.2

In this article we share a recent experience we had with implementing TLS 1.2 ONLY support on our databases and particularly with respect to its effect on Transaction Log Shipping sessions.  Read more...
Rating: |  Discuss |   Briefcase | 741 reads

Review Minimum SQL Server Security Practices

In this tip we look at different things you should consider when developing your database systems to ensure you are also thinking about security best practices as well.  Read more...
By Additional Articles 2019/01/02 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,657 reads

Spend More on Security

With a data breach at Marriot, there is a call from one person for companies to spend more on security.  Read more...
By Steve Jones 2018/12/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 20 reads

Get Patched If Not Supported

Many organizations that run older versions of SQL Server are not patched.  Read more...
By Steve Jones 2018/12/19 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Trust But Verify

Malware slips into packages, and it could slip into SQL code in the future.  Read more...
By Steve Jones 2018/12/18 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 35 reads

Lax Security is Harmful for Employment

Data breaches do more than harm an organization. There's a human cost.  Read more...
By Steve Jones 2018/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 56 reads

Another Reason to Care About Security

Just before the US holiday, Steve wants you to think about the security of our systems.  Read more...
By Steve Jones 2018/11/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 38 reads

Always On - Endpoint Ownership

Whoever creates an AlwaysOn group is, by default, the owner of the endpoint. This is generally not a problem…unless that person leaves the company and you need to delete the login.  Read more...
By Ginger Keys Daniel 2018/10/25 | Source: SQLServerCentral.com | Category: always on
Rating: |  Discuss |   Briefcase | 538 reads

Auditing the password changes using LOGIN_CHANGE_PASSWORD_GROUP Server

Auditing the password changes using LOGIN_CHANGE_PASSWORD_GROUP Server Level Audit Group.  Read more...
By Deepak Prasad Sahu 2018/10/18 | Source: SQLServerCentral.com | Category: audit specification
Rating: |  Discuss |   Briefcase | 442 reads

Being Careful with Schema Ownership

When you create a schema, you might accidentally make yourself the owner, which can cause issues later. Learn how to ensure that your schemas aren't owned by transient employees.  Read more...
By Steve Jones 2018/10/15 | Source: SQLServerCentral.com | Category: schema
Rating: |  Discuss |   Briefcase | 938 reads

Security, Compliance, Data Ethics, and Breaking the “Not My Job” Mindset

Security, compliance, and data ethics are related concepts that everyone who works with software should know about, from the help desk to the C-level office… but almost everyone thinks that worrying about these things is someone else’s problem.  Read more...
By Additional Articles 2018/09/27 | Source: SimpleTalk | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 3,512 reads

Protecting Our Stream of Data

We can't protect against all hacks, but can we prove they weren't our fault?  Read more...
By Steve Jones 2018/08/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 30 reads

The Weakest Link

Your security depends on the security of your business partners.  Read more...
By Steve Jones 2018/08/23 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 45 reads

Destroying Data

This week Steve talks about services that are available to destroy your data.  Read more...
By Steve Jones 2018/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 28 reads

The conflict between data protection and DevOps

Data breaches are the new normal – according to the Identity Theft Resource Center there were nearly 1,600 of them in 2017 in the US alone, exposing 179 million records. No wonder companies want to keep data confidential and protected. At the same time, however, the increasing pace of business means developers need to create and release code in much shorter DevOps timescales. Steve Jones discussed ways to solve this conflict  Read more...
By 2018/08/13 | Source: Redgate | Category: data protection
Rating: (not yet rated)  Rate this |   Briefcase | 2,433 reads

SQL Authentication Via AD Groups Part II: Who has what access?

In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.  Read more...
By John F. Tamburo 2018/08/03 (first published: 2016/02/18) | Source: SQLServerCentral.com | Category: active directory
Rating: |  Discuss |   Briefcase | 4,730 reads

Have You Been Hacked?

Security is a big deal, and Steve Jones wonders if most data professionals would be aware that they had been hacked.  Read more...
By Steve Jones 2018/07/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 207 reads

Setting Permissions to Drop a Database

Learn which permissions are required to drop a database and see a test to show that these apply.  Read more...
By Steve Jones 2018/07/17 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 475 reads
   Items 1 to 20 of 671    Older >>