THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » Security   (RSS)
Showing page 1 of 9 (88 total posts)
  • Dynamic Data Masking - Part 1 - The Mechanism

    This is part 1 of my Dynamic Data Masking blogs for my upcoming book project. An interesting feature that is being added to SQL Server 2016 is Dynamic Data Masking. What it does is, allow you to show a user a column, but instead of showing them the actual data, it masks it from their view. Like if you have a table that has email addresses, you ...
    Posted to Louis Davidson (Weblog) by drsql on February 1, 2016
  • What you should have read :) during the weekend - weekly SQL Server blogs review part 11

    Hello! It is Tuesday already. I hope you had great last week especially we have Christmas this week J. Maybe you will find some time to read the great posts I prepared? Hope you will have a lot of fun reading all of them.    ...
    Posted to Damian Widera (Weblog) by Damian Widera on December 22, 2015
  • Real World SSIS: A Survival Guide, 8 May, Baltimore

    My friend and fellow Linchpin, Tim Mitchell (blog | @Tim_Mitchell) will deliver a day-long seminar titled Real World SSIS: A Survival Guide the day before SQL Saturday – Baltimore (9 May). Attend and learn more about: Handling warnings, errors, and other bad stuff Data cleansing using SSIS, T-SQL, and DQS More than just a green box: ...
    Posted to Andy Leonard (Weblog) by andyleonard on April 8, 2015
  • Secure Connections Management in SSIS, Part 2

    SQL Server Integration Services (SSIS) is built to move data. SSIS ships with features to support the secure transmission of data. In this series, my goal is to promote awareness of these features and advocate for their use. SSIS Connection Managers In Secure Connections Management in SSIS, Part 1, I demonstrated configuring an SSIS Connection ...
    Posted to Andy Leonard (Weblog) by andyleonard on March 2, 2015
  • Secure Connections Management in SSIS, Part 1

    SQL Server Integration Services (SSIS) is built to move data. SSIS ships with features to support the secure transmission of data. In this series, my goal is to promote awareness of these features and advocate for their use. SSIS Connection Managers Let’s begin by examining ways to connect to a database – any database – using SSIS. ...
    Posted to Andy Leonard (Weblog) by andyleonard on February 25, 2015
  • Administering SSIS: Security-related SSIS Questions

    I credit my friend and brother, Chris Yates (Blog | @YatesSQL), for inspiring me to write this post with his (excellent) post: Reports in SSIS. If I had a nickel for each time I’ve been asked, “What permissions are required for SSIS?” I would have a lot of nickels. It’s a fair question with an unfair answer, “It depends.” “It Depends on ...
    Posted to Andy Leonard (Weblog) by andyleonard on January 19, 2015
  • Third Party Applications and Other Acts of Violence Against Your SQL Server

    I just got finished reading a great blog post from my buddy, Thomas LaRock (t | b), in which he describes a useful personal policy he used to track changes made to his SQL Servers when installing third-party products. Note that I'm talking about line-of-business applications here - your inventory management systems and help desk ...
    Posted to Kevin Kline (Weblog) by KKline on August 12, 2014
  • DevOps for Windows Azure

    ''DevOps'' (Short for Developer Operations) is one of a group of new terms such as ''Cloud'', ''Big Data'' and ''Data Scientist'' - words that are somewhere between marketing and tasks we've actually had around in other forms for years.However, working in a Distributed Environment (Both on and off premises)  like Windows Azure does bring a ...
    Posted to Buck Woody (Weblog) by BuckWoody on March 12, 2013
  • The Importance of Paranoia for the Technical Professional

    I recently read a blog post from a technical professional who’s account had been hacked (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/)  – not because he used poor passwords or unsafe practices, but because the hackers used some social engineering to get around the safety he had put into ...
    Posted to Buck Woody (Weblog) by BuckWoody on August 8, 2012
  • High-Availability White Papers and Resources for SQL Server

    In foreground, attendee makes dreaded ''shoot myself'' hand sign to the speaker.I was just telling the good people of Charlotte about how they (and how YOU) need to read all things by Paul Randal (blog | twitter), except for all of his cheesy romance novels like Caress and Conquer written under the nom de plum of ...
    Posted to Kevin Kline (Weblog) by KKline on July 26, 2012
1 2 3 4 5 Next > ... Last »
Powered by Community Server (Commercial Edition), by Telligent Systems
  Privacy Statement