How to Keep Data, Devices Secure When Mobile Is the Norm
When "work" can happen in any place, security breaches can happen any time and any way.
2019-05-14
When "work" can happen in any place, security breaches can happen any time and any way.
2019-05-14
2019-05-13
1,041 reads
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor....
2019-05-10
I recently did some research on the source of data breaches and in this article, I’m going to talk a bit about my current favorite source for breach information,...
2019-05-09
A skimming campaign continues to infect sites with malicious JavaScript.
2019-05-08
A year after 911 system hit, most of city's networks are down.
2019-05-08
The new Verizon 2019 Data Breach Investigations Report finds good and bad news on the security front.
2019-05-08
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.
2019-05-08
A company has both a server without a password and live data in test environments. Not a good situation.
2019-05-07
365 reads
I don't have a lot of good news for you. The truth is there's nothing we can do to protect our data from being stolen by cybercriminals and others....
2019-05-06
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers