THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » Security   (RSS)
Showing page 1 of 10 (94 total posts)
  • Intel Active Management Technology Vulnerability

    Certain Intel processors have a security vulnerability that you can read about at the Intel site or at the NIST Computer Security Resource Center. Make certain that you install the latest version of the Intel vulnerability analyzer which as of today was found here. The tool tells you if your computer is vulnerable to allowing a nonprivileged user ...
    Posted to John Paul Cook (Weblog) by John Paul Cook on June 2, 2017
  • In The Cloud: Owner Role and Security Administration

    Azure uses Role Based Access Control (RBAC), which is something people generally don’t pay at lot of attention to when initially learning how to use the Azure portal. Take a close look at the screen capture shown below. The Delete button is disabled. There are definitely times you want to protect Azure resources from accidental deletion. That’s ...
    Posted to John Paul Cook (Weblog) by John Paul Cook on May 20, 2017
  • 24 Hours of PASS (May 2017): Recordings now available!

    The sessions of the event 24 Hours of PASS Data Security and Data Quality edition (held the last May 2017 on 3rd and 4th) were recorded and now they are available for online streaming! If you have missed one session in particular or the entire event, you can view or review your preferred sessions. Each video is available on detail page of the ...
    Posted to Sergio Govoni (Weblog) by Sergio Govoni on May 12, 2017
  • 24 Hours of PASS (May 2017) – Data Security and Data Quality Edition

    Why can we say that SQL Server is the least vulnerable database system for the last seven years? Find it out from May 03 to 04, 2017 at the 24 Hours of PASS ''Data Security and Data Quality'' edition.  This series of one hour sessions will start at 12:00 UTC on May 3 and it will continue for 24 hours covering the following ...
    Posted to Sergio Govoni (Weblog) by Sergio Govoni on April 23, 2017
  • Row Level Security–Part 2-Write Operations

    In the first entry in this series (to view, follow this link), I took a look at the how row level security worked with read operations. Now in this entry, I want to expand that to how you use it to limit what a user might write to, or delete from a table. To recap our current situation, we have three users: CREATE USER BigHat WITHOUT ...
    Posted to Louis Davidson (Weblog) by drsql on March 4, 2016
  • Row Level Security – Part 1–Simple Read operations

    This is part 1 of my Row Level Security blogs for my upcoming book project. Row Level Security is a very interesting feature. Unlike Dynamic Data Masking (link), which looks interesting on it's face, once you dig in the utilization of the feature looks to be limited by how granular you can make the security work. Row Level Security on the other ...
    Posted to Louis Davidson (Weblog) by drsql on February 15, 2016
  • Dynamic Data Masking - Part 2–Security and Incorporating into Code

    This is part 2 of my Dynamic Data Masking blogs for my upcoming book project. Part 1 is here: Dynamic Data Masking - Part 1 - The Mechanism. Previously, in my first blog on Dynamic Data Masking - Part 1 - The Mechanisms, we had created the following table (I include this so you can see the DDL of creating the table with the MASKED WITH clause on ...
    Posted to Louis Davidson (Weblog) by drsql on February 8, 2016
  • What you should have read :) during the weekend - weekly SQL Server blogs review part 11

    Hello! It is Tuesday already. I hope you had great last week especially we have Christmas this week J. Maybe you will find some time to read the great posts I prepared? Hope you will have a lot of fun reading all of them.    ...
    Posted to Damian Widera (Weblog) by Damian Widera on December 22, 2015
  • Real World SSIS: A Survival Guide, 8 May, Baltimore

    My friend and fellow Linchpin, Tim Mitchell (blog | @Tim_Mitchell) will deliver a day-long seminar titled Real World SSIS: A Survival Guide the day before SQL Saturday – Baltimore (9 May). Attend and learn more about: Handling warnings, errors, and other bad stuff Data cleansing using SSIS, T-SQL, and DQS More than just a green box: ...
    Posted to Andy Leonard (Weblog) by andyleonard on April 8, 2015
  • Secure Connections Management in SSIS, Part 2

    SQL Server Integration Services (SSIS) is built to move data. SSIS ships with features to support the secure transmission of data. In this series, my goal is to promote awareness of these features and advocate for their use. SSIS Connection Managers In Secure Connections Management in SSIS, Part 1, I demonstrated configuring an SSIS Connection ...
    Posted to Andy Leonard (Weblog) by andyleonard on March 2, 2015
1 2 3 4 5 Next > ... Last »
Privacy Statement