More Supply Chain Attacks
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
101 reads
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
101 reads
We all know security is important, but we sometimes make the job harder when we don't handle data appropriately.
2025-03-19
160 reads
Phil Factor explains the enduring attachment of database developers to wildcards, despite their current deficiencies.
2025-03-17 (first published: 2018-12-17)
485 reads
It can be hard to change peoples' habits and get them to adopt new technology.
2025-03-15
99 reads
2025-03-14 (first published: 2018-11-02)
277 reads
2025-03-12 (first published: 2018-10-19)
1,033 reads
The ways in which you might try and reverse engineer a database design are on Steve's mind today.
2025-03-10 (first published: 2018-11-30)
309 reads
CSO recently published an article based on a report from Harmonic about generative AI data leaks, and the findings were eye-opening. According to the report, over 8% of employee prompts to public large language models (LLMs) contained sensitive data, ranging from security and compliance issues to privacy and legal vulnerabilities. This wasn’t just a handful […]
2025-03-08
146 reads
Today Steve asks if you track the details of your table growth inside a database.
2025-03-07
179 reads
The job outlook for database professionals is good, but it's not that easy to get a great job. Steve has some advice for you today.
2025-03-05
234 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
I've come across what appears to be a strange deadlock anomaly. As seen in...
Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...
Comments posted to this topic are about the item The Challenge of AI, which...
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers