Articles

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

Blogs

A Broken Copilot Query

By

I was testing the new SSMS (v22 Preview 3) with Copilot and ran into...

SQL Server Alerts

By

Don’t Let Trouble Sneak Up on You   Most SQL Servers run quietly. Until...

Prompt AI helping with Auditing

By

I had a conversation with a customer asking this question: how can I tell...

Read the latest Blogs

Forums

Create an HTML Report on the Status of SQL Server Agent Jobs

By Nisarg Upadhyay

Comments posted to this topic are about the item Create an HTML Report on...

Building a RESTful API with FastAPI and PostgreSQL

By sabyda

Comments posted to this topic are about the item Building a RESTful API with...

The Journey to PostgreSQL (or anything)

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Journey to PostgreSQL (or...

Visit the forum

Question of the Day

A Common Split

What happens when I run this code:

DECLARE @s VARCHAR(1000) = 'apple, pear, peach'
SELECT *
FROM STRING_SPLIT(@s, ', ')

See possible answers