2021-11-08
453 reads
2021-11-08
453 reads
Not a week goes by without news of a new cyberattack. In this article, Robert Sheldon explains the cybersecurity threats in today’s world.
2021-10-29
It might be DNS is the problem more often in the future. Steve notes the attacks on this system are rising.
2021-10-23
107 reads
First we had the Solarwinds hack, and now we have a Kaseya ransomware epidemic. It seems the criminals are moving up the stack. We used to see physical attacks on tapes and keyboards, then we saw OS level attacks. Now we seem to be getting to the management layer for software that is used to […]
2021-07-21
299 reads
There has been a trend to blame a single IT person, or a small group, for issues in large enterprises. Nowhere else in the corporate world would one person be blamed for a major failure.
2021-06-07
313 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
2021-05-19
211 reads
Criminal groups using ransomware are working together, which is bad news for all organizations.
2021-04-29
237 reads
Security is changing, and the "edge" of where we need to protect data is changing as well.
2021-04-21
183 reads
2021-04-20
221 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers