Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

   Items 1 to 20 of 605    Older >>
 

The Penalty for a Data Breach

One of the things that will be debated quite a bit in the next few years will be the penalties for data loss.  Read more...
By Steve Jones 2016/06/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 83 reads

The Politics of SQL Security

Dealing with SQL Server security when the application it uses is full of security holes.  Read more...
By Scott Crosby 2016/05/23 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 127 reads

The Proliferation of Roles

Using roles for security is a best practice that Steve Jones espouses.  Read more...
By Steve Jones 2016/05/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 54 reads

Track Your Consultants

It's possible to perform a man-in-the-middle attack against SQL Server. Steve Jones notes you should be aware these attacks could take place inside of your network.  Read more...
By Steve Jones 2016/03/29 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 58 reads

The One 'Security' Feature in Oracle You Probably Shouldn't Use

Oracle offers a number of security-related settings, but one could definitely create more harm than good. David Fitzjarrell looks at which parameter that is, and why.  Read more...
By Additional Articles 2016/03/24 | Source: Database Journal | Category: oracle
Rating: (not yet rated)  Rate this |   Briefcase | 4,763 reads

SQL Server 2016: The Data Protection Version

Today Steve Jones looks at the security enhancements in SQL Server 2016  Read more...
By Steve Jones 2016/02/24 | Source: SQLServerCentral.com | Category: sql server 2016
Rating: (not yet rated) |  Discuss |   Briefcase | 41 reads

SQL Authentication Via AD Groups Part II: Who has what access?

In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.  Read more...
By John F. Tamburo 2016/02/18 | Source: SQLServerCentral.com | Category: active directory
Rating: |  Discuss |   Briefcase | 3,250 reads

Forcing Strong Passwords

Passwords are always a challenge, but are bad passwords the users' fault? Steve Jones has a few thoughts.  Read more...
By Steve Jones 2016/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 95 reads

Reasonable Timeframes

Steve Jones talks about the timeframes for updating and fixing security problems in applications.  Read more...
By Steve Jones 2016/02/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 80 reads

The Digital Woes of Public Records

Public records have been open in the past, but today's digital access might mean problems.  Read more...
By Steve Jones 2016/02/09 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 98 reads

Enabling TDE on Databases in an AlwaysOn Scenario

Enabling Transparent Data Encryption on Databases in Always On Scenario  Read more...
By Sanjiv Doshetty 2016/02/09 | Source: SQLServerCentral.com | Category: alwayson
Rating: |  Discuss |   Briefcase | 2,073 reads

Microsoft Survey on Backup and Security

Microsoft is looking for some people to talk to for ~20 minutes via phone/Skype and as a thank you for sharing, will provide a $10 Amazon gift card after the call.  Read more...
By Press Release 2016/02/05 | Source: SQLServerCentral.com | Category: backup and restore
Rating: (not yet rated) |  Discuss |   Briefcase | 394 reads

Maybe Security is Harder than Rocket Science

It's hard to build strong security over time, but it's worth the effort. Steve Jones notes that even smart people have problems implementing strong security.  Read more...
By Steve Jones 2016/02/02 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 106 reads

SQL Server System Audit Report

Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.  Read more...
By Rudy Panigas 2016/02/02 | Source: SQLServerCentral.com | Category: audit
Rating: |  Discuss |   Briefcase | 3,332 reads

Security Convenience

Security is always a hot topic, and Steve Jones notes that we should be specific when we work with security.  Read more...
By Steve Jones 2016/01/15 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 118 reads

Rulebreaking Developers

How much of a problem is it when developers can blamed for issues?  Read more...
By Steve Jones 2016/01/07 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 232 reads

Hacking to Hide

People have hacked the voyage data recorders in ships. Steve Jones thinks this is a fundamental problem in computing systems.  Read more...
By Steve Jones 2016/01/05 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 163 reads

Why Use the Principle of Least Privilege?

SQL Injection isn't special code. It consists of regular, valid T-SQL that is unexpected by the application. Steve Jones notes that using the principle of least privilege can help to limit the damage from SQL Injection if the application fails to properly check input.  Read more...
By Steve Jones 2015/12/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 389 reads

Correct Old Mistakes

We all make mistakes, but it's important that we revise our code to correct them over time.  Read more...
By Steve Jones 2015/12/24 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 108 reads

Hacking Data

A new series of attacks were proven recently using music files to attach embedded systems in cars. Could this be another attack vector that we need to worry about?  Read more...
By Steve Jones 2015/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 557 reads
   Items 1 to 20 of 605    Older >>