Randomness in Security Configuration
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,411 reads
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,411 reads
These memes, from a security and privacy perspective, are nothing but trouble. Here’s an example I just saw a friend...
2017-08-11
1,418 reads
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
318 reads
This Wednesday, July 26th, at 12 PM EDT, I’ll be giving a presentation through Idera’s Geek Sync series. You will...
2017-07-24
289 reads
File this under “soft skills.” Let me start with a recent experience.
Last week I was leading a team of youth...
2017-08-08 (first published: 2017-07-20)
1,691 reads
Whenever I’m asked about creating a security model for an application or database, I tell folks to follow the Principle...
2017-07-17 (first published: 2017-06-30)
2,938 reads
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing, it has...
2017-06-29
558 reads
Authentication and Authorization, the first two of the three A’s of security, control who gets access to what. However, at...
2017-07-13 (first published: 2017-06-28)
1,620 reads
Having covered authentication yesterday, let’s move on the second A, authorization. Authentication was about proving identity. Now that we know...
2017-07-10 (first published: 2017-06-27)
1,660 reads
When I start talking with folks about security, one of the areas of confusion I often find has to do...
2017-07-05 (first published: 2017-06-26)
1,824 reads
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers