Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

   Items 1 to 20 of 550    Older >>
 

Who Watches the Watchers?

Who checks on those who manage our systems? Is there auditing in place for those accidental DBAs?  Read more...
By Brandie Tarvin 2014/10/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 253 reads

Stairway to SQL Server Security Level 4: Permissions

A permission gives a principal access to an object to perform certain actions on or with the object. SQL Server has a mind-numbingly huge number of permissions that you can grant to a principal, and you can even deny or revoke those permissions. This sounds a bit complicated, but by the end of this stairway level you’ll understand how SQL Server permissions work and how you can exert very granular control over object creation, data access, and other types of actions on database and server objects.  Read more...
By Don Kiely 2014/10/15 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,606 reads

Connecting to Analysis Services in Another Domain

Connecting to resources in untrusted domains with windows authentication can be tricky. Here's how to make it easy.  Read more...
By Ian Massi 2014/10/06 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,985 reads

Protect Confidential SQL Server Data Q and A

Following on from a webcast, Tim Smith answers some questions on SQL Server security like: Is It Better To Mask At the Application Level Or The SQL Server Database Level? Are there any options to find SSNs in SQL Server besides RegEx? And, why would anyone store sensitive data un-encrypted in SQL Server?   Read more...
By Additional Articles 2014/10/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 7,070 reads

Prevent Confidential Data at the Application Layer from getting into SQL Server

In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.  Read more...
By Additional Articles 2014/09/22 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 7,354 reads

A few reflections on security by a weary application developer

Data security? No worries! Tell me how much you are willing to pay.  Read more...
By George Copeland 2014/09/03 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

Yet Another Attack Vector

The lack of progress in amending our laws to handle the digital revolution in our leaves may leave us open to unexpected attacks.  Read more...
By Steve Jones 2014/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 108 reads

We Don't Care about Data and IT Security

Most of us say we care about IT and data security. Our actions speak differently.  Read more...
By Brian Kelley 2014/08/11 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 314 reads

Linked Server Tribulations In SQL Server

In this article, Thomas chronicles the difficulties of troubleshooting a linked server set up, with helpful tips and an exposé of a Linked Server UI flaw.   Read more...
By Thomas Knight 2014/08/05 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 5,129 reads

Spackle: Making sure you can connect to the DAC

The DAC is an important tool and several things can go wrong when trying to connect to it.  Read more...
By Kenneth Fisher 2014/07/31 | Source: SQLServerCentral.com | Category: dac
Rating: |  Discuss |   Briefcase | 2,918 reads

Data Driven Security

Set a security standard across environments that developers can see and run, but not change.  Read more...
By Andre Quitta 2014/07/30 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,528 reads

Elevation of Privileges

The elevation of privileges is a large security problem and Steve Jones discusses his fears. Would you know if someone successfully attacked your instance?  Read more...
By Steve Jones 2014/07/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 109 reads

New SQL Server 2014 Permissions: CONNECT ANY DATABASE

CONNECT ANY DATABASE is one of three new permissions in SQL Server 2014 that can be granted to server logins. What is this new permission good for and why would we ever want this?  Read more...
By Edward Pollack 2014/07/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,288 reads

Frustration with Bad Design

It can be frustrating to deal with poorly implemented systems, but Steve Jones notes that you can't take things into your own hands.  Read more...
By Steve Jones 2014/07/28 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 284 reads

Database Permissions

Here is a short How To article on querying for permissions in a SQL Server database  Read more...
By C.J. Garcia 2014/07/01 | Source: SQLServerCentral.com | Category: database permissions
Rating: |  Discuss |   Briefcase | 5,509 reads

Lockdown or Let Them Free

Do we take security too far? Are we creating unnecessary rules for those that need to use the resources we support? Steve Jones talks today about security and how we might want to approach it when handling rights for developers.  Read more...
By Steve Jones 2014/06/27 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 203 reads

Stairway to SQL Server Security Level 2: Authentication

Authentication is the first step in letting a principal get access to an instance of SQL Server, essentially resolving the question, Who are you? In this stairway level you’ll learn about the basics of authentication and the authentication options available. This level covers logins and users and you’ll learn about the password policies that can help strengthen SQL Server authentication.  Read more...
By Don Kiely 2014/06/18 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,122 reads

Cloud Storage Security: Are You Doing Your Part?

If the level cloud storage encryption are so high, then why is the cloud security industry experiencing such distrust?  Read more...
By Natalie Lehrer 2014/06/18 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 64 reads

Server Role Membership Validation

Need to know how to verify if a login has server-level access to your SQL Server instance?  Read more...
By Shawn Melton 2014/06/17 | Source: SQLServerCentral.com | Category: server roles
Rating: |  Discuss |   Briefcase | 2,274 reads

How Safe is Cloud Storage?

As more and more companies look to the cloud for their data storage needs, the same questions are being asked over and over again: if a security breech were to occur, who would be responsible and how much of a guarantee could the provider give us that our data would be safe from prying eyes.  Read more...
By Additional Articles 2014/06/17 | Source: Database Journal | Category: cloud
Rating: (not yet rated)  Rate this |   Briefcase | 4,960 reads
   Items 1 to 20 of 550    Older >>