File carving methods for the MySQL DBA
(David Busby) This is a long overdue blog post from London’s 44con Cyber Security conference back in September. A lot of old memories were brought to the front as it were; the one I’m going to cover i...
Keeping Up To Date
Are you keeping up with updates for your SQL Engine? I know this is not the easiest thing to do. It is difficult to find a time when the databases are not in use, or you invest a lot of money havi...
Managing Azure SQL Database Authorization
(Marcin Policht) When planning for deployment of Azure SQL Database, it is important to consider all of the security measures that can be implemented as part of the defense in depth strategy. We have ...
Azure SQL Database Gets Closer to Pure SQL Server
(David Ramel) Microsoft announced a bevy of improvements to its cloud-based data products, including the Azure SQL Database Update V12 (preview), sporting new security features and bringing it closer ...
ASP.NET MVC Security through Validation
(Nick Harrison) In IT development work, security is everyone's responsibility. Most computer security breaches do not usually occur as a result of a single vulnerability. They happen because a breach ...
General facts of SQL SERVER - part 5
General facts of SQL SERVER - Part 5
Classifying SQL SERVER opportunities
SQL SERVER offers several options which can support an individual to increase the effectiveness of database ...
Reports In SSISDB
(Chris Yates) I was approached with an in shop issue where a group could not view the execution reports in the SSISDB. The reason for this was due to the security standards in place at the shop; the u...
DB2 Security Policy
(Jack Vamvas) This DB2 Security Policy sample is a basis for applying DB2 security good practise and regular audits. A DB2 environment is characterised by various developers(internal), administrator...
Finding a common AD group for a set of users.
(Kenneth Fisher) I work for a large organization that over the last few years has been doing a LOT of reorgs. And what comes with reorgs? Lots of security requests. I’m always working to find easier w...
Azure SQL Database Auditing
(Marcin Policht) Contemplating migration of on-premises systems to Microsoft Azure commonly raises security and confidentiality concerns since it is associated, at least to a certain degree, with reli...
Industry Must Haves Key Management
DATA SECURITY HAS COME A LONG WAY within just the past few years.
Organizations no longer have to continue to maintain current patchwork
methods because there are no available, cost-effective, or in...