Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 912    Older >>
 

Reasonable Timeframes

Steve Jones talks about the timeframes for updating and fixing security problems in applications.  Read more...
By Steve Jones 2016/02/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 62 reads

REVERT

By Steve Jones 2016/02/11 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 820 reads

The Digital Woes of Public Records

Public records have been open in the past, but today's digital access might mean problems.  Read more...
By Steve Jones 2016/02/09 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 77 reads

Enabling TDE on Databases in an AlwaysOn Scenario

Enabling Transparent Data Encryption on Databases in Always On Scenario  Read more...
By Sanjiv Doshetty 2016/02/09 | Source: SQLServerCentral.com | Category: alwayson
Rating: |  Discuss |   Briefcase | 1,688 reads

Microsoft Survey on Backup and Security

Microsoft is looking for some people to talk to for ~20 minutes via phone/Skype and as a thank you for sharing, will provide a $10 Amazon gift card after the call.  Read more...
By Press Release 2016/02/05 | Source: SQLServerCentral.com | Category: backup and restore
Rating: (not yet rated) |  Discuss |   Briefcase | 345 reads

CONNECTing to SQL Server

By Steve Jones 2016/02/03 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,078 reads

Maybe Security is Harder than Rocket Science

It's hard to build strong security over time, but it's worth the effort. Steve Jones notes that even smart people have problems implementing strong security.  Read more...
By Steve Jones 2016/02/02 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 95 reads

SQL Server System Audit Report

Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.  Read more...
By Rudy Panigas 2016/02/02 | Source: SQLServerCentral.com | Category: audit
Rating: |  Discuss |   Briefcase | 2,880 reads

EXECUTE AS procedures

By Steve Jones 2016/02/01 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,250 reads

The security scheme

By Steve Jones 2016/01/26 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,223 reads

Security Convenience

Security is always a hot topic, and Steve Jones notes that we should be specific when we work with security.  Read more...
By Steve Jones 2016/01/15 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 111 reads

Rulebreaking Developers

How much of a problem is it when developers can blamed for issues?  Read more...
By Steve Jones 2016/01/07 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 223 reads

Hacking to Hide

People have hacked the voyage data recorders in ships. Steve Jones thinks this is a fundamental problem in computing systems.  Read more...
By Steve Jones 2016/01/05 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 161 reads

changing encryption

By Steve Jones 2015/12/28 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,044 reads

Why Use the Principle of Least Privilege?

SQL Injection isn't special code. It consists of regular, valid T-SQL that is unexpected by the application. Steve Jones notes that using the principle of least privilege can help to limit the damage from SQL Injection if the application fails to properly check input.  Read more...
By Steve Jones 2015/12/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 387 reads

Mapping Logins

By Steve Jones 2015/12/24 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,532 reads

Correct Old Mistakes

We all make mistakes, but it's important that we revise our code to correct them over time.  Read more...
By Steve Jones 2015/12/24 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 106 reads

Changing User Names

By Steve Jones 2015/12/22 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,380 reads

Hacking Data

A new series of attacks were proven recently using music files to attach embedded systems in cars. Could this be another attack vector that we need to worry about?  Read more...
By Steve Jones 2015/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 556 reads

Running as SysAdmin

Today we have a guest editorial from Andy Warren. We still have many applications runnning under sysadmin accounts, often "sa". Why do people do this? Andy has a few thoughts on the subject.  Read more...
By Andy Warren 2015/12/21 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 497 reads
   Items 1 to 20 of 912    Older >>
 
Tags
editorial (142)    
sql server 7 (105)    
administration (70)    
sql server 2005 (56)    
blogs (53)    
encryption (42)    
strategies (40)    
t-sql (36)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
permissions (24)    
auditing (22)    
logins (20)    
miscellaneous (15)    
sql server 2008 (15)    
backup and restore (14)    
passwords (13)    
transparent data encryption (tde) (13)    
programming (11)    
roles (11)    
sql injection (11)    
sql server 6.5 (11)    
configuring (9)    
reporting services (ssrs) (9)    
software development (9)    
database design (8)    
role (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
stairway series (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
news (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
users (5)    
worst practices (5)    
active directory (4)    
authentication (4)    
biometrics (4)    
data retention (4)    
execute as (4)    
installation (4)    
legal issues (4)    
orphaned users (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
best practices (3)    
cloud computing (3)    
ddl triggers (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
central management server (cms) (2)    
certificates (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
active directory groups (1)    
ad (1)    
ad groups (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always encrypted (1)    
alwayson (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure (1)    
azure sql database (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbcc (1)    
ddl (1)    
default trace (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
integrated security (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
row-level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)