Balancing Priorities
This one isn't a technical post, but it's entirely appropriate to those of us in the IT field. Today was a...
2009-06-02
772 reads
This one isn't a technical post, but it's entirely appropriate to those of us in the IT field. Today was a...
2009-06-02
772 reads
On a couple of recent webcasts, I pointed out the folks were running with the local Administrator account. To start this out, I'm not a big fan of security by obfuscation. Security by obfuscation (not code obfuscation, but security by obscurity, if...
2009-06-02
2,556 reads
When it comes to securing a system, it's important to understand how it might be attacked. That's what surface area...
2009-06-01
1,323 reads
Whenever I do a security presentation, I make sure to cover the Principle of Least Privilege. And when I do...
2009-05-29
3,154 reads
On a couple of recent webcasts, I pointed out the folks were running with the local Administrator account. To start...
2009-05-28
2,157 reads
I was playing around with the endpoint catalog views this afternoon just looking at ways to do poor man's configuration...
2009-05-27
2,821 reads
Tomorrow night, May 28th, I'll be speaking the Augusta Developer's Guild. This is a make-up from earlier in the year...
2009-05-27
1,379 reads
One of the main defenses touted against SQL injection attacks is to use proper parameterization at the application layer. But while this gets most of the cases, there are clearly examples where this alone fails. For instance, consider the stored procedure...
2009-05-20
3,948 reads
Yesterday I did something I wouldn't have thought of doing a year ago: I stayed home. When I woke up,...
2009-05-19
843 reads
Note:Since there have been several comments on this, I'm using parameterization at the application layer in the security sense of...
2009-05-15
2,705 reads
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...
Comments posted to this topic are about the item The Challenge of AI, which...
Comments posted to this topic are about the item Deprecated Feature Tracking
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers