Security

Technical Article

Common Vulnerabilities in Database Security

  • Article

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

External Article

SQL Server 2000 Security - Part 13 - SQL Injection attack

  • Article

Typically, access to data is provided via client applications, which increases the range of potential vulnerabilities and places an equal share of responsibility for data security on software developers. This is especially important since application flaws can have just as catastrophic implications as a misconfigured or unsecured SQL Server installation.

2004-10-19

2,337 reads

SQLServerCentral Article

SQL Server Auditing - Part 1

  • Article

Our SQL Server Security expert, Brian Kelley, brings us the first part of a new series on auditing. Most of the auditing articles we've had are based on how you audit changes to data. Brian looks at auditing from the server itself, explaining the different levels of auditing built into SQL Server 2000.

5 (3)

You rated this post out of 5. Change rating

2007-10-02 (first published: )

39,483 reads

SQLServerCentral Article

Review: NGSSquirrel

  • Article

NGS Software is in the security business and have been very successful in finding vulnerabilities in many products, notable SQL Server. They have used their expertise to build products to help you better secure your systems. Dale Corey looks at one of those products, NGSSquirrel, which does vulnerability assessment.

5 (1)

You rated this post out of 5. Change rating

2004-07-30

10,652 reads

Blogs

Down the Rabbit Hole: Dealing with Ad-Hoc Data Requests

By

"But I don’t want to go among mad people," Alice remarked."Oh, you can’t help...

Adding a Local Model to Ollama through the GUI

By

I saw some good reviews of the small gemma3 model in a few places...

Connect resiliently to SQL Server

By

 Why you should connect resiliently to SQL Server Transient failures happen — in the cloud...

Read the latest Blogs

Forums

Parameter sniffing issue with different minutes as opposed to using midnight

By mikael_ljunghorn

Hej, I'm not facing this issue but as I was working another parameter sniffing...

🍓 Raspberries Price Trend – 2025 Market Insights and Analysis

By kunil4574

Hello everyone, I wanted to open a discussion on the Raspberries Price Trend since...

Some query values change when query is run but not others. Why?

By water490

Hi everyone I have a 1000 line SQL query that is too long to...

Visit the forum

Question of the Day

PWDCompare

What does the PWDCOMPARE function do?

See possible answers