In the wake of Shell Shock, I’ve seen some vendor advisories indicate that while their product is vulnerable, it’s only through the management interface but everything is okay because if best practices have been followed, the management interface isn’t/hasn’t been exposed to the Internet.
No, everything is not okay.… Read more
PASS has taken a lot of heat recently. A few folks have pointed out that you only seem to hear when people are upset at PASS at something. So here’s my take on what PASS has done correctly.
September is Childhood Cancer Awareness Month here in the USA. Here are some statistics:
- In 2014, an estimated 15, 780 children (ages 0-19) will be diagnosed with cancer in the USA.
- In 2014, an estimated…
I will be given a webinar on how to audit SQL Server through MSSQLTips.com.
Don’t become a statistic. With the numerous data breaches and internal data theft, securing your SQL Server environment can help keep your company out of the news. Unfortunately, a… Read more
I Don’t Have to Do It Alone
I’ve always worked hard in my IT career to be knowledgeable in my field. I don’t like not… Read more
Anything we can do to automate our builds and deployment should be considered. After all, the point isn’t just to write code, but to deploy working code. So what if we did the automated builds and deployed them to development or QA? No errors, so I’m good, right?
Not so… Read more
If you haven’t already, please read Denise McInerney’s post about why PASS no longer stands for the Professional Association for SQL Server.
The Growth of an Organization
If you’ve been involved with PASS lately, you’ve probably seen this change coming. When I read the post, I wasn’t surprised. PASS… Read more
I had the opportunity to write another guest post at SQL Authority:
This one covers how to determine who made changes in a database that has been deleted. This isn’t a situation where you can use the schema changes history report… Read more
I was reading a book about network security monitoring and it mentioned The Cuckoo’s Egg by Cliff Stoll. Stoll’s book has been around for a long time, and it’s considered a classic book with regards to information security. If you’re not familiar with it, it’s the story of a gentleman… Read more
My guest editorial is live on SQLServerCentral.com. My argument is a simple one: we don’t care about data and IT security. I don’t just mean IT folks. I mean most everybody. I include myself in this characterization. I know a few exceptions, but they are truly exceptions.
In the… Read more
I will be giving a presentation on ETL (Extract, Transform, Load) security at two user groups in the coming weeks.
Securing the ETL Pipeline
We’re going to look at typical ETL (Extract, Transform, Load) pipelines and consider the weak points an attacker might go after. Our goal in this isn’t… Read more
Statistics, Indexes, and their Impact
Speaker: Brian Kelley, SQL Server MVP
Statistics. Indexes. Clustered Indexes. Non-Clustered Indexes. Covering Indexes. Bookmark Lookups. Perhaps you’ve heard these… Read more
Let’s make it democratic. Let’s ensure we get solid sessions from key people. And let’s save a ton of work in the process.
There are certain folks that are extremely knowledgeable in their areas of expertise. They also happen to be excellent presenters. Have the spotlight sessions and… Read more
On Facebook last night, I posted the following:
An operational DBA isn’t just a manager of a traditional RDBMS, transactional system. An operational DBA manages the data platform, whatever it is, when it hits production. Their goals are not traditionally the same as someone focused on development. They are looking…
If you’re thinking, “Why would I want (to be) a lazy DBA?” let me explain. There’s a lot to be said for hard work. However, have you ever seen someone who… Read more
I’m not prophetic, I promise. However, some good news on the service pack front with regards to SQL Server 2008 and 2008 R2. There have been rumblings about a last service pack for these versions of SQL Server for a while, but nothing official had been said. However, an… Read more
“This is one reason I’ve been hesitant to remain current with Cumulative Updates (CUs). Microsoft doesn’t stand behind them, with the text on each CU page that users should only apply the patch if they…
When we talk about security, we often point to the Point of Least Privilege. I write a lot about applying this to SQL Server, but it’s important to handle this outside of SQL Server, especially at the file / share level. Why would we care about this as DBAs /… Read more
(in a wrestling announcer’s shocked voice) “It can’t be! He’s not supposed to be here! It’s the Scary DBA! What’s he doing here!”
Do you know what the “Three A’s of Security” are and how they apply to Microsoft SQL Server? Let’s look at them as they are important for managing security properly on a given Microsoft SQL Server.
Authentication is determining who a person/process is.
When a connection is made, it’s… Read more