THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » Security   (RSS)
Showing page 1 of 5 (42 total posts)
  • PASS Summit 2017 Day 3

    You can read this blog post at this link: https://jorgklein.com/2017/11/04/pass-summit-2017-day-3/ This blog has moved to https://jorgklein.com There will be no further posts on sqlblog.com. Please update your feeds accordingly. You can follow me on twitter: http://twitter.com/jorg__klein
    Posted to Jorg Klein (Weblog) by jorg on November 3, 2017
  • Intel Active Management Technology Vulnerability

    Certain Intel processors have a security vulnerability that you can read about at the Intel site or at the NIST Computer Security Resource Center. Make certain that you install the latest version of the Intel vulnerability analyzer which as of today was found here. The tool tells you if your computer is vulnerable to allowing a nonprivileged user ...
    Posted to John Paul Cook (Weblog) by John Paul Cook on June 2, 2017
  • In The Cloud: Owner Role and Security Administration

    Azure uses Role Based Access Control (RBAC), which is something people generally don’t pay at lot of attention to when initially learning how to use the Azure portal. Take a close look at the screen capture shown below. The Delete button is disabled. There are definitely times you want to protect Azure resources from accidental deletion. That’s ...
    Posted to John Paul Cook (Weblog) by John Paul Cook on May 20, 2017
  • 24 Hours of PASS (May 2017): Recordings now available!

    The sessions of the event 24 Hours of PASS Data Security and Data Quality edition (held the last May 2017 on 3rd and 4th) were recorded and now they are available for online streaming! If you have missed one session in particular or the entire event, you can view or review your preferred sessions. Each video is available on detail page of the ...
    Posted to Sergio Govoni (Weblog) by Sergio Govoni on May 12, 2017
  • 24 Hours of PASS (May 2017) – Data Security and Data Quality Edition

    Why can we say that SQL Server is the least vulnerable database system for the last seven years? Find it out from May 03 to 04, 2017 at the 24 Hours of PASS ''Data Security and Data Quality'' edition.  This series of one hour sessions will start at 12:00 UTC on May 3 and it will continue for 24 hours covering the following ...
    Posted to Sergio Govoni (Weblog) by Sergio Govoni on April 23, 2017
  • Row Level Security–Part 2-Write Operations

    In the first entry in this series (to view, follow this link), I took a look at the how row level security worked with read operations. Now in this entry, I want to expand that to how you use it to limit what a user might write to, or delete from a table. To recap our current situation, we have three users: CREATE USER BigHat WITHOUT ...
    Posted to Louis Davidson (Weblog) by drsql on March 4, 2016
  • Row Level Security – Part 1–Simple Read operations

    This is part 1 of my Row Level Security blogs for my upcoming book project. Row Level Security is a very interesting feature. Unlike Dynamic Data Masking (link), which looks interesting on it's face, once you dig in the utilization of the feature looks to be limited by how granular you can make the security work. Row Level Security on the other ...
    Posted to Louis Davidson (Weblog) by drsql on February 15, 2016
  • Dynamic Data Masking - Part 2–Security and Incorporating into Code

    This is part 2 of my Dynamic Data Masking blogs for my upcoming book project. Part 1 is here: Dynamic Data Masking - Part 1 - The Mechanism. Previously, in my first blog on Dynamic Data Masking - Part 1 - The Mechanisms, we had created the following table (I include this so you can see the DDL of creating the table with the MASKED WITH clause on ...
    Posted to Louis Davidson (Weblog) by drsql on February 8, 2016
  • What you should have read :) during the weekend - weekly SQL Server blogs review part 11

    Hello! It is Tuesday already. I hope you had great last week especially we have Christmas this week J. Maybe you will find some time to read the great posts I prepared? Hope you will have a lot of fun reading all of them.    ...
    Posted to Damian Widera (Weblog) by Damian Widera on December 22, 2015
  • Third Party Applications and Other Acts of Violence Against Your SQL Server

    I just got finished reading a great blog post from my buddy, Thomas LaRock (t | b), in which he describes a useful personal policy he used to track changes made to his SQL Servers when installing third-party products. Note that I'm talking about line-of-business applications here - your inventory management systems and help desk ...
    Posted to Kevin Kline (Weblog) by KKline on August 12, 2014
1 2 3 4 5 Next >
Privacy Statement