Introduction to SQL Server Security — Part 5
The series so far: Introduction to SQL Server Security — Part 1 Introduction to SQL Server Security — Part 2 Introduction to SQL Server Security — Part 3 Introduction to SQL Server Security — Part 4...
View ArticleWhat to monitor for SQL Server security
SQL Server databases are under greater threat than ever. Cyberattacks are on the rise, and they’re becoming more sophisticated with each new generation. And these aren’t the only risks. Organizations...
View ArticleSQL Server security – Providing a security model using user-defined roles
When developing an application that accesses SQL Server, you need to set up a security model, so each user gets the access they need based on their job duties. Some applications require the same access...
View ArticleCybersecurity threats
Organizations are under greater threat than ever. It doesn’t matter the type of industry or size of the organization. Threat actors of all kinds—whether governments, criminals, corporate spies, or your...
View ArticleRansomware: A world under threat
Ransomware represents one of the biggest security threats faced by today’s organizations. A ransomware attack can have a devastating impact on an organization, and few organizations are immune from the...
View ArticleSQL Server vulnerabilities and assessment
Even with security measures in place, SQL Servers can fall prey to cyberattacks. The threat actors target the servers to gain access to the sensitive data locked away in the SQL databases as well as...
View ArticleSQL Server Row Level Security Deep Dive. Part 1 – Introduction and Use Cases
This is part of a series on Row Level Security by Ben Johnston. For the rest of the series, click here My initial goal of documenting and exploring SQL Server Row Level Security (RLS) was to show the...
View ArticleSQL Server Security Primer
SQL Server security structure, mechanisms and methods are very thoroughly documented in the Microsoft documentation, but it is quite daunting if you don’t already know about the functionality. I...
View Article