Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

<< Newer    Items 21 to 40 of 597    Older >>
 

The Dangers of Travel

As data professionals, we might carry lots of information with us that relates to our organization. Will we get caught up in government issues as we cross borders?  Read more...
By Steve Jones 2015/10/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 184 reads

Serious Hacking

The biggest government hack ever occurred recently. At least until the next one happens.  Read more...
By Steve Jones 2015/10/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 216 reads

Find Permission Changes In The Default Trace

Learn how to find who has changed permissions from the default trace   Read more...
By Lori Brown 2015/10/13 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 1,914 reads

Storing Passwords in a Secure Way in a SQL Server Database

Measures such as using special characters and numbers within a password are of little use to security if passwords are then stored in an insecure way. Sergey Gigoyan explains how to encrypt and store passwords in a SQL Server database.  Read more...
By Additional Articles 2015/10/09 | Source: MSSQLTips.com | Category: storing passwords
Rating: (not yet rated)  Rate this |   Briefcase | 4,925 reads

Everyone is a Target

Today Steve Jones looks at the targeted attacks by hackers against individual security professionals.  Read more...
By Steve Jones 2015/09/23 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 118 reads

Cloud Security Issues

The cloud is always going to be a challenge for security, but is it harder or easier than on premises? Steve Jones has a few comments.  Read more...
By Steve Jones 2015/08/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 127 reads

Stairway to SQL Server Security Level 10: Row-Level Security

Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.  Read more...
By Don Kiely 2015/07/29 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,371 reads

Azure SQL Database Security Features

The Microsoft Azure platform is evolving fast. Azure SQL Database is riding high on the cloud wave with new features enabled at a fast pace. In this article, Kun Cheng shares a few Azure SQL Database security features that could help developers and DBAs develop and manage a secure SQL Database solution.  Read more...
By Additional Articles 2015/07/17 | Source: SQLCAT | Category: azure sql database
Rating: (not yet rated)  Rate this |   Briefcase | 5,471 reads

MS15-058: Vulnerabilities in SQL Server could allow remote code execution

A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.  Read more...
By Press Release 2015/07/15 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 5,392 reads

Grant User Access to All SQL Server Databases

Consider a situation when you have a large number of databases on your SQL Server, and you are requested to grant user access to all SQL Server databases. How can you grant access to a user for all databases on a SQL Server instance?  Read more...
By Additional Articles 2015/06/30 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,518 reads

Stored Procedures and SQL Injection

Why do stored procedures help with security? In this piece, MVP Brian Kelley explains why SQL Injection and information gathering are hampered with stored procedures.  Read more...
By Brian Kelley 2015/06/12 (first published: 2013/02/18) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 20,206 reads

Hack Us

A challenge from United intrigues Steve Jones. How many other companies would make a challenge like this?  Read more...
By Steve Jones 2015/05/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 177 reads

PCI Best Practices Guide for SQL Server DBAs

Tibor Nagy has put together some best practices to help SQL Server DBAs navigate the many different requirements around PCI compliance.  Read more...
By Additional Articles 2015/05/21 | Source: MSSQLTips.com | Category: best practices
Rating: (not yet rated)  Rate this |   Briefcase | 6,373 reads

How to Get SQL Server Security Horribly Wrong

It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.  Read more...
By Additional Articles 2015/05/13 | Source: SimpleTalk | Category: security
Rating:  Rate this |   Briefcase | 8,799 reads

How to Recover a SQL Server Login Password

I will describe a simple method anyone can use to obtain lost password information for a SQL Server login.  Read more...
By Geoff Albin 2015/04/24 (first published: 2013/03/04) | Source: SQLServerCentral.com | Category: password cracking
Rating: |  Discuss |   Briefcase | 30,888 reads

The Opportunistic Hacker

Sometimes the crimes of opportunity might be the worst ones for our data.  Read more...
By Steve Jones 2015/04/14 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 200 reads

Stairway to SQL Server Security Level 7: Security Across Databases with Cross-Database Ownership Chaining

Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.  Read more...
By Don Kiely 2015/04/08 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,659 reads

Source Code Security

The code you use may contain security information. Be extra careful in this case, especially when you use encryption.  Read more...
By Steve Jones 2015/03/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 111 reads

SQL Injection, Still?

We still have problems with SQL Injection. Steve Jones has a few thoughts on why.  Read more...
By Steve Jones 2015/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 276 reads

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.  Read more...
By Don Kiely 2015/02/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,845 reads
<< Newer    Items 21 to 40 of 597    Older >>