2022-09-12
514 reads
2022-09-12
514 reads
Learn how to find all securable objects in SQL Server and the permissions for each securable object using the system function fn_builtin_permissions.
2022-08-31
DevOps is often thought of as bringing more features to customers, but it can also help security.
2022-08-15
132 reads
In this article, we look at how to mask/hide data for users using Dynamic Data Masking in SQL Server and Data Redaction in Oracle
2022-08-08
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
3,184 reads
2022-05-25
488 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
Project Zero from Google aims to study zero day vulnerabilities. Steve hopes it leads to better security.
2022-05-04
100 reads
2022-04-22
468 reads
Having a known and documented incident response plan is important these days, as more and more companies are having security incidents.
2022-04-06
128 reads
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers