2019-05-20
850 reads
2019-05-20
850 reads
SQL Server contains many built-in views and functions that can be used to understand what is going on “under the hood,” and security is no exception. In this article, Robert Sheldon explains the security related catalogue views, dynamic management views, and system functions.
2019-05-20
When "work" can happen in any place, security breaches can happen any time and any way.
2019-05-14
2019-05-13
1,044 reads
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor....
2019-05-10
I recently did some research on the source of data breaches and in this article, I’m going to talk a bit about my current favorite source for breach information,...
2019-05-09
A skimming campaign continues to infect sites with malicious JavaScript.
2019-05-08
A year after 911 system hit, most of city's networks are down.
2019-05-08
The new Verizon 2019 Data Breach Investigations Report finds good and bad news on the security front.
2019-05-08
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.
2019-05-08
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
I've come across what appears to be a strange deadlock anomaly. As seen in...
Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...
Comments posted to this topic are about the item The Challenge of AI, which...
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers