security

SQLServerCentral Article

Can We Please Stop Sending Passwords Over the Wire?

  • Article

While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]

5 (8)

You rated this post out of 5. Change rating

2022-03-02

5,416 reads

SQLServerCentral Article

Query control made easy

  • Article

Overview As we all know, data security is a never-ending battle. Every day, we hear of new data breaches. It's a hard problem, and there is no single solution, other than a defense in depth. Let's look at one of those defenses for databases: query control. Query control is a simple idea: most applications access […]

4.25 (4)

You rated this post out of 5. Change rating

2022-01-07

3,988 reads

SQLServerCentral Article

SQL Server Data Classification Comes Alive

  • Article

Overview Microsoft SQL Server 2012 introduced a feature called data classification, which allows you to mark certain columns with labels, indicating that these columns contain sensitive or special-handling data. For instance, you may want to mark a column containing credit card numbers as "confidential", or sales numbers as "management only". The problem is that you […]

5 (1)

You rated this post out of 5. Change rating

2021-12-10

5,122 reads

SQLServerCentral Article

SQL Server Data Masking: a comparison with Gallium Data

  • Article

Introduction In SQL Server 2016, Microsoft introduced a new feature called dynamic data masking, which allows you to mask the values of certain columns and keep that data hidden from certain users, without having to modify your applications. Let's take a look at how SQL Server does data masking, and compare it to the way Gallium Data […]

You rated this post out of 5. Change rating

2021-12-03

1,866 reads

Blogs

SQL Server Source Control on a $0 Budget

By

The Source Control Dilemma Every DBA has been there. Trying to keep track of...

CHOOSE’ing a Beer: #SQLNewBlogger

By

We recently published an article on CHOOSE at SQL Server Central. I thought it...

Don’t Treat Your Data Catalog Like a Data Museum

By

Introduction Treating your data catalog like a “data museum”—a static collection where information quietly...

Read the latest Blogs

Forums

What programming languages are useful for cybersecurity?

By princydeshmukh28

Programming languages play a crucial role in cybersecurity, helping professionals analyze threats, develop security...

Migrating mission critical database from SQL on Prem to Azure SQL

By Mikael Åkerblom

We are migrating our environments to Azure, it will be a mix of SQL...

The Inefficiencies of Kubernetes

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Inefficiencies of Kubernetes

Visit the forum

Question of the Day

The Backup Space Needed

How do I calculate the amount of space needed for I/O buffers during a backup operation?

See possible answers