More Supply Chain Attacks
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
76 reads
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
76 reads
We all know security is important, but we sometimes make the job harder when we don't handle data appropriately.
2025-03-19
138 reads
Explanation: sys.databases contains information about all databases on the SQL Server instance. • HAS_DBACCESS(name) = 1 filters out the databases you dont have access to. •ORDER BY name sorts the result alphabetically.
2025-03-04
66 reads
There is a report that less ransomware ransom is being paid. Perhaps that's a good sign for all of us.
2025-02-19
66 reads
AI has tremendous possibilities but also a number of security issues. Steve highlights one scary security issue today.
2025-01-27
103 reads
2025-01-04
95 reads
Like ancient Gaul, SQL is divided into three sub- languages. The DDL (Data Declaration Language) declares the data. This is where we find the data types, constraints, references and other structures that have to do with how the data stored . The DML (Data Manipulation Language) uses those declarations to change their contents or to invoke them. It does not change structures and schema objects.
2024-12-04
Are your developers working with live production data, completely made-up synthetic data, or something in between? I posted a poll here on the blog and on a few of my social media feeds, and here were the results:
2024-11-06
If you encounter Django in your environment, are you thinking about SQL Injection and security? If not, read this article and learn how to protect your data.
2024-11-01
944 reads
Cloud security can be better than on-premises, but it requires work and knowledge.
2024-10-30
114 reads
By Kevin3NF
The Source Control Dilemma Every DBA has been there. Trying to keep track of...
By Steve Jones
We recently published an article on CHOOSE at SQL Server Central. I thought it...
Introduction Treating your data catalog like a “data museum”—a static collection where information quietly...
Programming languages play a crucial role in cybersecurity, helping professionals analyze threats, develop security...
We are migrating our environments to Azure, it will be a mix of SQL...
Comments posted to this topic are about the item The Inefficiencies of Kubernetes
How do I calculate the amount of space needed for I/O buffers during a backup operation?
See possible answers