Where do data breaches come from?
I recently did some research on the source of data breaches and in this article, I’m going to talk a bit about my current favorite source for breach information,...
2019-05-09
I recently did some research on the source of data breaches and in this article, I’m going to talk a bit about my current favorite source for breach information,...
2019-05-09
A skimming campaign continues to infect sites with malicious JavaScript.
2019-05-08
A year after 911 system hit, most of city's networks are down.
2019-05-08
The new Verizon 2019 Data Breach Investigations Report finds good and bad news on the security front.
2019-05-08
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.
2019-05-08
A company has both a server without a password and live data in test environments. Not a good situation.
2026-04-03 (first published: 2019-05-07)
468 reads
I don't have a lot of good news for you. The truth is there's nothing we can do to protect our data from being stolen by cybercriminals and others....
2019-05-06
The hackers collected usernames, hashed passwords and in some cases GitHub and Bitbucket access tokens used to access repositories on the popular Git platforms many developers use for version control.
2019-05-03
The more Grant Fritchey reads about data breaches, the more he realizes: It’s You. It’s your fault.
2019-05-02
2019-04-29
745 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers