Treat All Sensitive Data as Important
No matter what the reason you have sensitive information, you need to treat it carefully.
2019-02-21
39 reads
No matter what the reason you have sensitive information, you need to treat it carefully.
2019-02-21
39 reads
2019-02-20
45 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
45 reads
Journalist Alamzeb Khan discusses recent security breaches in Pakistan that have affected millions of people and accounts.
2019-01-31
3,554 reads
Having a good process for managing security is important, but how many of us enforce that?
2019-01-18
256 reads
Security is important, and Steve wonders if any of us have a list of things we do that improve security.
2019-01-11
61 reads
In this article we share a recent experience we had with implementing TLS 1.2 ONLY support on our databases and particularly with respect to its effect on Transaction Log Shipping sessions.
2019-01-03
2,000 reads
In this tip we look at different things you should consider when developing your database systems to ensure you are also thinking about security best practices as well.
2019-01-02
2,792 reads
With a data breach at Marriot, there is a call from one person for companies to spend more on security.
2018-12-20
25 reads
Many organizations that run older versions of SQL Server are not patched.
2018-12-19
40 reads
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers