SQL Ledger: Protecting Data in Azure SQL
Learn how you can set up and use Ledger tables in an Azure SQL Database to verify the integrity of your database changes.
2022-09-07
9,101 reads
Learn how you can set up and use Ledger tables in an Azure SQL Database to verify the integrity of your database changes.
2022-09-07
9,101 reads
While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]
2022-03-02
5,547 reads
Overview As we all know, data security is a never-ending battle. Every day, we hear of new data breaches. It's a hard problem, and there is no single solution, other than a defense in depth. Let's look at one of those defenses for databases: query control. Query control is a simple idea: most applications access […]
2022-01-07
4,025 reads
Overview Microsoft SQL Server 2012 introduced a feature called data classification, which allows you to mark certain columns with labels, indicating that these columns contain sensitive or special-handling data. For instance, you may want to mark a column containing credit card numbers as "confidential", or sales numbers as "management only". The problem is that you […]
2021-12-10
5,221 reads
Introduction In SQL Server 2016, Microsoft introduced a new feature called dynamic data masking, which allows you to mask the values of certain columns and keep that data hidden from certain users, without having to modify your applications. Let's take a look at how SQL Server does data masking, and compare it to the way Gallium Data […]
2021-12-03
1,955 reads
Ransomware has threatened many organizations over the past few years. In this article, Robert Sheldon explains the history of ransomware and what needs to be done to protect against it.
2021-11-22
A quick look at how the native SQL Server Row-Level Security compares with Gallium Data's solution for limiting access to rows of data.
2021-11-15
3,122 reads
Database professionals are spending 1/3 of their time on security tasks each day and say it’s their biggest professional challenge this year. Learn how 2500+ database professionals are reacting to these unprecedented demands in our third database monitoring insights report.
2021-11-08
Not a week goes by without news of a new cyberattack. In this article, Robert Sheldon explains the cybersecurity threats in today’s world.
2021-10-29
Azure Databricks has a number of Access Controls and Row Level Security options that we will explore in this article.
2021-06-18
By Bert Wagner
I almost ordered parts for a circuit that would have destroyed itself the instant...
By Brian Kelley
Following the advice in Smart Brevity improves communication.
By John
Microsoft has released SQL Server 2025, bringing big improvements to its main database engine....
Comments posted to this topic are about the item Which Table I
Comments posted to this topic are about the item Using Python notebooks to save...
Comments posted to this topic are about the item Your AI Successes
I have this code in SQL Server 2022:
CREATE SCHEMA etl;
GO
CREATE TABLE etl.product
(
ProductID INT,
ProductName VARCHAR(100)
);
GO
INSERT etl.product
VALUES
(2, 'Bee AI Wearable');
GO
CREATE TABLE dbo.product
(
ProductID INT,
ProductName VARCHAR(100)
);
GO
INSERT dbo.product
VALUES
(1, 'Spiral College-ruled Notebook');
GO
CREATE OR ALTER PROCEDURE etl.GettheProduct
AS
BEGIN
SELECT ProductName
FROM product;
END;
GO
When I execute this code as a user whose default schema is dbo and has rights to the tables and proc, what is returned? See possible answers