Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

<< Newer    Items 21 to 40 of 541    Older >>
 

Database User Superfluousness In SQL Server

In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.  Read more...
By Thomas Knight 2014/02/04 | Source: SQLServerCentral.com | Category: users
Rating: |  Discuss |   Briefcase | 3,850 reads

Managing SSIS Security with Database Roles

SQL Server 2012 introduced the new project deployment model for Integration Services. This tip will guide you through the process of setting up security for the SSIS 2012 catalog.  Read more...
Rating: (not yet rated)  Rate this |   Briefcase | 2,107 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 220 reads

The Future of Auditing

Auditing is a weak point in SQL Server according to Steve Jones. He looks at a few of its flaws.  Read more...
By Steve Jones 2013/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 182 reads

Cyberwar

Today Steve Jones talks about the prospect of cyberwar and the potential impacts on corporate systems. Perhaps we ought to be building better, more secure software.   Read more...
By Steve Jones 2013/11/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 80 reads

Blocking Users by IP

SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.  Read more...
By Brian Kelley 2013/11/08 (first published: 2009/03/09) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,896 reads

Execute As

Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.  Read more...
By Patrick Cahill 2013/10/11 (first published: 2011/02/02) | Source: SQLServerCentral.com | Category: execute as
Rating: |  Discuss |   Briefcase | 16,127 reads

Letting People Go Securely

Having employees leave your company is a reality of life. But how do you handle letting your IT workers go and protect your systems? Steve Jones isn't sure there is much you can do to prevent issues, but you can deal with them.  Read more...
By Steve Jones 2013/10/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 323 reads

The Challenges of Being Safe

Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.  Read more...
By Steve Jones 2013/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 234 reads

Secure Programming

Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.  Read more...
By Steve Jones 2013/10/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 459 reads

Loginless Database Users and Dynamic SQL

Implement Loginless Database Users to maintain data security and preserve interface when dynamic SQL is being used within a stored procedure.  Read more...
By Orlando Colamatteo 2013/09/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,463 reads

Lost in the Noise

Can a honeypot provide you with more security? It's an interesting idea from Steve Jones today that might help you detect, and respond, to security events.  Read more...
By Steve Jones 2013/08/27 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 96 reads

Physical Security

The physical security of our systems might be a bigger problem in the future as more and more hackers are finding ways into secure areas.  Read more...
By Steve Jones 2013/08/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 106 reads

Review Your Code

Steve Jones notes that SQL Injection is still a problem, and while it might be for some time to come, we should not be adding to the issues. Learn how to write secure code.  Read more...
By Steve Jones 2013/08/12 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 318 reads

Resolving Errors While Connecting to SSIS

This article will help you solve connection errors with SSIS due to permission issues.  Read more...
Rating: |  Discuss |   Briefcase | 3,413 reads

Password Ninjas

How do you keep track of passwords? A few experts out there share some of their techniques and Steve Jones adds his thoughts.  Read more...
By Steve Jones 2013/07/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 250 reads

Hack Resistant?

Can we make a hack resistant database? A vendor claims this, but Steve Jones thinks it's not really a good claim to make and that we ought to make it our job to secure databases.  Read more...
By Steve Jones 2013/07/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 145 reads

More Data Security Issues

The state of data security is getting better in the US, according to the 2013 survey from Symmatec. However we still have issues.  Read more...
By Steve Jones 2013/06/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 101 reads

Loginless In Seattle

Identify orphaned Database Users and differentiate them from "Loginless" Database Users.  Read more...
By Orlando Colamatteo 2013/05/13 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,914 reads

The Security of You

There is a lot of data out there that is specific to an individual, none more important perhaps than biometric data. Steve Jones writes a bit about the security implications involved in working with this data. (This editorial was originally published on Nov 10, 2008. It is being re-run as Steve is at SQL Bits.)  Read more...
By Steve Jones 2013/05/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 184 reads
<< Newer    Items 21 to 40 of 541    Older >>