2016-10-19
1,177 reads
2016-10-19
1,177 reads
What happens if we can't access the Internet? We should be prepared, at home and work. Steve Jones has a few comments.
2016-10-03
89 reads
2016-09-07
1,119 reads
No matter what we do to secure our databases, we need to be sure our applications are well written, both with secure coding, but also good information handling.
2016-08-23
84 reads
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
82 reads
This week Steve Jones looks at a new idea, rating the security of products publicly to try and shame vendors into more secure coding.
2016-08-08
76 reads
With AD Authentication via groups, SQL Server is vulnerable to orphaned Windows users' logins being added to SQL Server at a later date. This article gives an improved user audit script that detects orphaned DB Users and also a delete script.
2016-07-18
2,589 reads
Today Steve Jones notes that back doors could be inserted into chips, which would be a huge problem.
2016-07-18
90 reads
In SQL 2016 several new security features gets introduced which will help users to protect their data in many ways. New security feature Row Level Security (RLS) which implements the security inside the database itself, not at application level.
2016-07-14
4,328 reads
Not more hacking, but rather a data error in some cars is disturbing to Steve Jones.
2016-07-05
120 reads
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers