The Security of Old Tech
Older technology can introduce security issues, along with performance ones. Keeping your systems somewhat up to date is important for security.
2025-09-12
58 reads
Older technology can introduce security issues, along with performance ones. Keeping your systems somewhat up to date is important for security.
2025-09-12
58 reads
Passwords are essential and also a problem in many organizations. Guidance has changed over the years and Steve has a few thoughts on what's recommended today.
2025-09-10
118 reads
Zero-Trust Architecture (ZTA) emerges as a strong security paradigm for cloud-based AI systems, fundamentally operating on the principle of “never trust, always verify.” Unlike conventional security models, ZTA assumes potential compromise exists within the network and requires continuous verification of every access request regardless of origin.
2025-07-09
This article explores how to securely clone the master user permissions in Amazon RDS for SQL Server using a custom stored procedure, usp_rds_clone_login. It outlines a step-by-step process to generate, review, and apply a script that replicates server- and database-level access from the master user to a new login without directly exposing elevated credentials. The guide emphasizes the principle of least privilege, supports named account management, and enables transparent, auditable permission handling for DBAs and applications. Designed for secure and scalable environments, this solution enhances operational security while maintaining administrative flexibility in Amazon RDS.
2025-07-09
502 reads
Steve examines the idea that we might all have a data breach at some point.
2025-05-16
80 reads
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
93 reads
We all know security is important, but we sometimes make the job harder when we don't handle data appropriately.
2025-03-19
153 reads
Explanation: sys.databases contains information about all databases on the SQL Server instance. • HAS_DBACCESS(name) = 1 filters out the databases you dont have access to. •ORDER BY name sorts the result alphabetically.
2025-03-04
285 reads
There is a report that less ransomware ransom is being paid. Perhaps that's a good sign for all of us.
2025-02-19
72 reads
AI has tremendous possibilities but also a number of security issues. Steve highlights one scary security issue today.
2025-01-27
107 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers