2023-02-06 (first published: 2023-02-01)
873 reads
2023-02-06 (first published: 2023-02-01)
873 reads
Passwords cracked in under an hour using modern hardware have Steve shaking his head.
2022-10-22
372 reads
2022-10-21
2022-09-12
505 reads
Learn how to find all securable objects in SQL Server and the permissions for each securable object using the system function fn_builtin_permissions.
2022-08-31
DevOps is often thought of as bringing more features to customers, but it can also help security.
2022-08-15
122 reads
In this article, we look at how to mask/hide data for users using Dynamic Data Masking in SQL Server and Data Redaction in Oracle
2022-08-08
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
2,924 reads
2022-05-25
472 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
By Steve Jones
A new feature added to Redgate Monitor Enterprise automatically. CIS compliance is something many...
By Steve Jones
This is my last week of the year working (I guess I come back...
By Steve Jones
suente– n. the state of being so familiar with someone that you can be...
I am not understanding why this command completes "successfully" and it seems correct to...
get-ChildItem C:\ -recurse -erroraction silentlycontinue | sort length -descending | select -first 10 FullName,length...
Which of these indexes is superseded by another?
See possible answers