2013-07-26
1,709 reads
2013-07-26
1,709 reads
2013-07-18
2,084 reads
A short look at the vulnerabilities your data may be susceptible to outside of the database tables.
2013-03-07
6,289 reads
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,823 reads
2011-12-28
1,988 reads
With data stored in tables, you have a few options to protect data. Check out this tip to learn more about column level encryption.
2011-12-14
5,812 reads
Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.
2011-02-18
4,894 reads
2010-06-16
3,027 reads
A look at how you might recover from a disaster using encryption and an HSM module in SQL Server 2008.
2010-06-02
9,775 reads
I need to encrypt my data within SQL Server and I plan on using the built-in encryption functionality in SQL Server 2005 and 2008. However, I'm looking at symmetric and asymmetric key algorithms and while I see information saying to use symmetric keys, I don't understand why. What's the difference between the two and why is a symmetric key algorithm preferred over the asymmetric key ones?
2009-12-02
3,414 reads
By Steve Jones
For a number of years, we’ve produced the State of the Database Landscape report,...
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers