More in Database Security

  • scary ghoul
    Oct 31, 2013
    blog

    SQL Injection: Something Really Scary 1

    As far as I'm concerned we'll likely always have SQL Injection around to haunt us. Even though this attack vector has been well-publicized and well-documented for well over a decade (and then some), failure to account for it continues to pop all the time—even in catastrophic places....More
  • Sep 30, 2013
    blog

    SQL Server Authentication on Internet Facing Servers

    If you’ve got a SQL Server that's publicly facing, make sure you've done everything you can to make it as secure as possible....More
  • Dec 18, 2012
    blog

    SQL Server and Anti-Virus

    Every once in a while, one of my SQL Server Consulting clients asks me for my opinions about running Anti-Virus on production SQL Servers. And, amazingly enough, I actually (personally feel and) argue that anti-virus really shouldn’t be run in production data centers....More
  • computer keyboard with red backup key
    Jan 2, 2012
    blog

    Off-Box Backups and Luke-Warm Standby Servers, Part III

    Just having copies of your SQL Server backups in secondary/remote locations is not a disaster recovery plan....More
  • standby button
    Dec 23, 2011
    blog

    Off-Box Backups and Luke-Warm Standby Servers – Part II 1

    Following up on my previous post, when it comes to the need to create off-box backups, there are really only two (well, three) main reasons you’d want to do Off-Box Backups: Three Primary Reasons for Off-Box Backups First: Redundancy. As I pointed out in my last post: If you’re only keeping backups and data on the same server or hardware, then you’re DOING IT WRONG....More
  • screenshot of Back Up Database - SSV3
    Dec 13, 2011
    blog

    Off-Box Backups and Luke-Warm Standby Servers – Part I

    SQL Server’s RESTORE statement is insanely powerful. Not only because of the obvious fact that it can be handy in a disaster (when you have regular backups in place), but because it’s also so incredibly versatile....More
  • Sep 30, 2011
    blog

    Staying Safe from the Coming Storm

    Hackers have been taking advantage of Graphical Processing Units (GPUs or Video Cards) for some time now to leverage their ‘massively parallel’ processing power as a way to much more efficiently attempt password cracking. To that end, it’s no surprise that hackers can use modern GPUs to generate literally billions of password ‘guesses’ per second....More
  • Boxer with red boxing gloves
    Feb 20, 2011
    blog

    Dynamic SQL vs. OPTION (RECOMPILE)

    Is it better to use OPTION (RECOMPILE) rather than dynamic SQL? Both options are likely to recompile each time, and forcing recompilation with OPTION (RECOMPILE) doesn’t have the security implications of dynamic string execution....More

From the Blogs
May 22, 2017
Sponsored

Chief Data Officer Playbook: How to Be Successful in This Ground-Breaking Role

Companies looking to grow and extract value from their data are increasingly turning to Chief Data Officers (CDOs) to execute their data strategy. The role is new, and a playbook is necessary to address the many challenges CDOs face....More
May 12, 2017
blog

5 Common Challenges to Building BI in the Cloud

After spending 20 years building analytics, BI and database solutions, I've focused on Cloud data solutions over the past 2 years. I've chosen 5 common challenges that I face every day with Cloud migrations and that you'll face in your Cloud BI projects....More
Sep 15, 2016
Sponsored

Power BI Desktop “Publish to Pyramid Server” Button

Many organizations today cannot use public cloud solutions because of security concerns, administrative challenges and functional limitations. However, they still need a centralized platform where end users can conduct self-service analytics in an IT-enabled environment....More

Sponsored Introduction Continue on to (or wait seconds) ×