SQL Server Row-Level Security: A Comparison with Gallium Data
A quick look at how the native SQL Server Row-Level Security compares with Gallium Data's solution for limiting access to rows of data.
2021-11-15
3,119 reads
A quick look at how the native SQL Server Row-Level Security compares with Gallium Data's solution for limiting access to rows of data.
2021-11-15
3,119 reads
2021-11-15
424 reads
2021-11-08
458 reads
Not a week goes by without news of a new cyberattack. In this article, Robert Sheldon explains the cybersecurity threats in today’s world.
2021-10-29
It might be DNS is the problem more often in the future. Steve notes the attacks on this system are rising.
2021-10-23
111 reads
First we had the Solarwinds hack, and now we have a Kaseya ransomware epidemic. It seems the criminals are moving up the stack. We used to see physical attacks on tapes and keyboards, then we saw OS level attacks. Now we seem to be getting to the management layer for software that is used to […]
2021-07-21
301 reads
There has been a trend to blame a single IT person, or a small group, for issues in large enterprises. Nowhere else in the corporate world would one person be blamed for a major failure.
2021-06-07
315 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
2021-05-19
215 reads
Criminal groups using ransomware are working together, which is bad news for all organizations.
2021-04-29
239 reads
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers