Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

<< Newer    Items 21 to 40 of 546    Older >>
 

The Endless Upgrade Cycle

Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.  Read more...
By Steve Jones 2014/03/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 103 reads

Lawsuits and Data Breaches

Steve Jones notes that a data breach resulted in a lawsuit. How long before that's a common practice, and should we be preparing as data professionals.  Read more...
By Steve Jones 2014/02/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 112 reads

Auditing Matters

We might not be able to stop hacks, attacks, or issues with our databases, but knowing that they've occurred is important. Steve Jones notes that we might need auditing more than security.  Read more...
By Steve Jones 2014/02/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 132 reads

SQL Server Security Checklist

SQL Server security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. Here is your SQL Server security checklist.  Read more...
By Additional Articles 2014/02/20 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 3,241 reads

The Security of Interconnected Systems

We are interconnecting more and more computer systems and applications all the time. Security becomes a problem when one of these systems hasn't been properly configured, secured, or coded. Steve Jones notes this is becoming a real problem.  Read more...
By Steve Jones 2014/02/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 112 reads

Database User Superfluousness In SQL Server

In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.  Read more...
By Thomas Knight 2014/02/04 | Source: SQLServerCentral.com | Category: users
Rating: |  Discuss |   Briefcase | 3,874 reads

Managing SSIS Security with Database Roles

SQL Server 2012 introduced the new project deployment model for Integration Services. This tip will guide you through the process of setting up security for the SSIS 2012 catalog.  Read more...
Rating: (not yet rated)  Rate this |   Briefcase | 2,137 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 234 reads

The Future of Auditing

Auditing is a weak point in SQL Server according to Steve Jones. He looks at a few of its flaws.  Read more...
By Steve Jones 2013/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 183 reads

Cyberwar

Today Steve Jones talks about the prospect of cyberwar and the potential impacts on corporate systems. Perhaps we ought to be building better, more secure software.   Read more...
By Steve Jones 2013/11/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 80 reads

Blocking Users by IP

SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.  Read more...
By Brian Kelley 2013/11/08 (first published: 2009/03/09) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,951 reads

Execute As

Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.  Read more...
By Patrick Cahill 2013/10/11 (first published: 2011/02/02) | Source: SQLServerCentral.com | Category: execute as
Rating: |  Discuss |   Briefcase | 16,161 reads

Letting People Go Securely

Having employees leave your company is a reality of life. But how do you handle letting your IT workers go and protect your systems? Steve Jones isn't sure there is much you can do to prevent issues, but you can deal with them.  Read more...
By Steve Jones 2013/10/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 323 reads

The Challenges of Being Safe

Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.  Read more...
By Steve Jones 2013/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 234 reads

Secure Programming

Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.  Read more...
By Steve Jones 2013/10/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 460 reads

Loginless Database Users and Dynamic SQL

Implement Loginless Database Users to maintain data security and preserve interface when dynamic SQL is being used within a stored procedure.  Read more...
By Orlando Colamatteo 2013/09/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,484 reads

Lost in the Noise

Can a honeypot provide you with more security? It's an interesting idea from Steve Jones today that might help you detect, and respond, to security events.  Read more...
By Steve Jones 2013/08/27 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 96 reads

Physical Security

The physical security of our systems might be a bigger problem in the future as more and more hackers are finding ways into secure areas.  Read more...
By Steve Jones 2013/08/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 106 reads

Review Your Code

Steve Jones notes that SQL Injection is still a problem, and while it might be for some time to come, we should not be adding to the issues. Learn how to write secure code.  Read more...
By Steve Jones 2013/08/12 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 320 reads

Resolving Errors While Connecting to SSIS

This article will help you solve connection errors with SSIS due to permission issues.  Read more...
Rating: |  Discuss |   Briefcase | 3,417 reads
<< Newer    Items 21 to 40 of 546    Older >>