Database Security, People and Processes
Protecting data is not easy, but it is critical. In this article, David Poole discusses database security and the behaviors needed to build secure systems.
2020-01-22
Protecting data is not easy, but it is critical. In this article, David Poole discusses database security and the behaviors needed to build secure systems.
2020-01-22
Until you open the box your data is, like Schrödinger's cat, both safe and breached.
2019-11-16
127 reads
Redgate are inviting senior data professionals to attend one of the upcoming SQL in the City Summit events taking place in June. If you’re interested in learning how your business can benefit from implementing Compliant Database DevOps this event is for you. Find out who’s presenting and register for a Summit near you today.
2019-06-11 (first published: 2019-05-29)
Redgate are inviting senior data professionals to attend one of the upcoming SQL in the City Summit events taking place in May and June. If you’re interested in learning how your business can benefit from implementing Compliant Database DevOps this event is for you. Find out who’s presenting and register for a Summit near you today.
2019-05-20 (first published: 2019-05-01)
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.
2019-04-08
SQL Server supports partially contained databases. This gives you the option of adding database users with a password inside the database. This makes the database easier to move to another instance or participate in an Always On Availability Group. In this article, Robert Sheldon explains how to work with users in contained databases.
2019-03-14
2,987 reads
SQL Server supports partially contained databases. This gives you the option of adding database users with a password inside the database. This makes the database easier to move to another instance or participate in an Always On Availability Group. In this article, Robert Sheldon explains how to work with users in contained databases.
2019-03-11
In this article, the second in the series, Robert Sheldon demonstrates how to manage the SQL Server security with granting permissions to users, logins, and groups.
2019-02-25
2,336 reads
In this article, we show how we used Database Snapshots as a rollbackup plan for a database migration from one data centre to another. Database Snapshots proved to be the best route since we sould not afford the time a backup/restore approach would take.
2020-08-28 (first published: 2018-12-11)
2,270 reads
The GDPR is in full effect but meeting the requirements may still be confusing for many companies. In this article, William Brewer discusses what is needed to ensure compliance, including when a Data Protection Impact Assessment is required. He also explains the Data Protection Officer role.
2018-07-23
3,908 reads
By Steve Jones
I can’t remember how I heard about Small Data SF 2024, but it caught...
By Steve Jones
moledro – n. a feeling of resonant connection with an author or artist you’ll...
By Arun Sirpal
Let’s go back to data platforms today and I want to talk about a...
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers