UPDATE: The story that originally got my attention has been updated in all of the places I could still find it yesterday, so I’m pulling my references to the story and just focusing on the positive ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
I have worked with SQL Server for many years now, back to Sybase SQL Server days and there has always been confusion over Logins and Users. Even though they typically use the same name they are ...
Users and developers access SQL Server for completely different reasons. So, be sure you set up access as defined by who they are and why they need access. For many database administrators, managing ...
The Big Four biz’s big fat fail exposed a boatload of secrets online A Dutch cybersecurity outfit says its lead researcher ...
Sentrigo discovered a new security hole in SQL Server, but so far Microsoft isn't paying attention. Let me show you why they should Last week Sentrigo brought a security hole in SQL Server to my ...
Last time, we talked about security from a user's point of view. In this post, let's discuss how applications should authenticate with SQL Server. Like user logins, application logins need to be ...
SEATTLE — In the aftermath of the Slammer worm that wreaked havoc with many SQL Server users early this year, Microsoft Corp. is trying to make its database software more secure. But there’s still ...
Idera, a leading provider of management and administration solutions for Microsoft Windows Servers, has announced SQLsecure 2.5, a security analysis solution that helps database administrators (DBAs) ...
DH2i, the world's major provider of always-secure and always-on IT solutions, announced the release of a new hands-on ...