2023-07-26
501 reads
2023-07-26
501 reads
Microsoft is recommending more security for SQL Servers, including dev and test instances. Do you agree this is a good idea? Would you implement this?
2023-06-28
189 reads
In this article, learn how to control access levels to various data and parts of Power BI reports using row-level security as well as column and object-level security.
2024-01-09 (first published: 2023-06-19)
2023-05-29
303 reads
Steve notes that password expiration is important for SQL Logins, but he knows this isn't always configured when logins are created, or checked later to see if it is still enabled.
2023-05-27
439 reads
This article looks at four security best practices for protecting databases in AWS along with how GuardDuty can be used to provide additional security.
2023-05-17
1,257 reads
The way the public thinks about security issues isn't always accurate, but we have to accept that and learn to respond in a professional manner.
2023-05-03
116 reads
This article looks at security mechanisms in the cloud that can help protect your data, with specific examples in AWS.
2023-04-14
1,322 reads
Not only is the security of our organization important, but that of our partners matters as well.
2023-03-08
131 reads
Stale data from Microsoft has led to many systems being more vulnerable than they should have been. There's no excuse for this, from Microsoft or our own organizations.
2023-03-01
115 reads
By Steve Jones
A new feature added to Redgate Monitor Enterprise automatically. CIS compliance is something many...
By Steve Jones
This is my last week of the year working (I guess I come back...
By Steve Jones
suente– n. the state of being so familiar with someone that you can be...
I am not understanding why this command completes "successfully" and it seems correct to...
get-ChildItem C:\ -recurse -erroraction silentlycontinue | sort length -descending | select -first 10 FullName,length...
Which of these indexes is superseded by another?
See possible answers