2022-10-21
2022-10-21
2022-09-12
516 reads
Learn how to find all securable objects in SQL Server and the permissions for each securable object using the system function fn_builtin_permissions.
2022-08-31
DevOps is often thought of as bringing more features to customers, but it can also help security.
2022-08-15
137 reads
In this article, we look at how to mask/hide data for users using Dynamic Data Masking in SQL Server and Data Redaction in Oracle
2022-08-08
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
3,198 reads
2022-05-25
496 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
Project Zero from Google aims to study zero day vulnerabilities. Steve hopes it leads to better security.
2022-05-04
100 reads
2022-04-22
468 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers