Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag security Rss

Search for any content tagged security

   Items 1 to 20 of 528    Older >>
 

If or When?

Are data breaches a question of if they will happen to you or when will they happen to you?  Read more...
By Steve Jones 2014/04/10 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 128 reads

Data Security Policies

Does your organization have policies around data security? Perhaps they should, or perhaps you should ask for some to be created and education available for users.  Read more...
By Steve Jones 2014/04/07 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 86 reads

The Endless Upgrade Cycle

Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.  Read more...
By Steve Jones 2014/03/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 97 reads

Lawsuits and Data Breaches

Steve Jones notes that a data breach resulted in a lawsuit. How long before that's a common practice, and should we be preparing as data professionals.  Read more...
By Steve Jones 2014/02/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 111 reads

Auditing Matters

We might not be able to stop hacks, attacks, or issues with our databases, but knowing that they've occurred is important. Steve Jones notes that we might need auditing more than security.  Read more...
By Steve Jones 2014/02/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 121 reads

SQL Server Security Checklist

SQL Server security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. Here is your SQL Server security checklist.  Read more...
By Additional Articles 2014/02/20 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 3,003 reads

The Security of Interconnected Systems

We are interconnecting more and more computer systems and applications all the time. Security becomes a problem when one of these systems hasn't been properly configured, secured, or coded. Steve Jones notes this is becoming a real problem.  Read more...
By Steve Jones 2014/02/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 110 reads

Database User Superfluousness In SQL Server

In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.  Read more...
By Thomas Knight 2014/02/04 | Source: SQLServerCentral.com | Category: users
Rating: |  Discuss |   Briefcase | 3,795 reads

Managing SSIS Security with Database Roles

SQL Server 2012 introduced the new project deployment model for Integration Services. This tip will guide you through the process of setting up security for the SSIS 2012 catalog.  Read more...
Rating: (not yet rated)  Rate this |   Briefcase | 2,005 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 194 reads

The Future of Auditing

Auditing is a weak point in SQL Server according to Steve Jones. He looks at a few of its flaws.  Read more...
By Steve Jones 2013/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 179 reads

Cyberwar

Today Steve Jones talks about the prospect of cyberwar and the potential impacts on corporate systems. Perhaps we ought to be building better, more secure software.   Read more...
By Steve Jones 2013/11/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 80 reads

Blocking Users by IP

SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.  Read more...
By Brian Kelley 2013/11/08 (first published: 2009/03/09) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,725 reads

Execute As

Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.  Read more...
By Patrick Cahill 2013/10/11 (first published: 2011/02/02) | Source: SQLServerCentral.com | Category: execute as
Rating: |  Discuss |   Briefcase | 16,040 reads

Letting People Go Securely

Having employees leave your company is a reality of life. But how do you handle letting your IT workers go and protect your systems? Steve Jones isn't sure there is much you can do to prevent issues, but you can deal with them.  Read more...
By Steve Jones 2013/10/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 321 reads

The Challenges of Being Safe

Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.  Read more...
By Steve Jones 2013/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 233 reads

Secure Programming

Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.  Read more...
By Steve Jones 2013/10/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 458 reads

Loginless Database Users and Dynamic SQL

Implement Loginless Database Users to maintain data security and preserve interface when dynamic SQL is being used within a stored procedure.  Read more...
By Orlando Colamatteo 2013/09/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,432 reads

Lost in the Noise

Can a honeypot provide you with more security? It's an interesting idea from Steve Jones today that might help you detect, and respond, to security events.  Read more...
By Steve Jones 2013/08/27 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 95 reads

Physical Security

The physical security of our systems might be a bigger problem in the future as more and more hackers are finding ways into secure areas.  Read more...
By Steve Jones 2013/08/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 105 reads
   Items 1 to 20 of 528    Older >>