security

SQLServerCentral Article

Can We Please Stop Sending Passwords Over the Wire?

  • Article

While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]

5 (8)

You rated this post out of 5. Change rating

2022-03-02

5,325 reads

SQLServerCentral Article

Query control made easy

  • Article

Overview As we all know, data security is a never-ending battle. Every day, we hear of new data breaches. It's a hard problem, and there is no single solution, other than a defense in depth. Let's look at one of those defenses for databases: query control. Query control is a simple idea: most applications access […]

4.25 (4)

You rated this post out of 5. Change rating

2022-01-07

3,941 reads

SQLServerCentral Article

SQL Server Data Classification Comes Alive

  • Article

Overview Microsoft SQL Server 2012 introduced a feature called data classification, which allows you to mark certain columns with labels, indicating that these columns contain sensitive or special-handling data. For instance, you may want to mark a column containing credit card numbers as "confidential", or sales numbers as "management only". The problem is that you […]

5 (1)

You rated this post out of 5. Change rating

2021-12-10

5,035 reads

SQLServerCentral Article

SQL Server Data Masking: a comparison with Gallium Data

  • Article

Introduction In SQL Server 2016, Microsoft introduced a new feature called dynamic data masking, which allows you to mask the values of certain columns and keep that data hidden from certain users, without having to modify your applications. Let's take a look at how SQL Server does data masking, and compare it to the way Gallium Data […]

You rated this post out of 5. Change rating

2021-12-03

1,807 reads

Blogs

Simple Talks Episode 9–Data masking and subsetting

By

The episode on data masking and subetting is out. You can see it here:...

T-SQL Tuesday #180: Avoid Perfect for Good Enough

By

I'm listening to Effortless by Greg McKeon (link to author's page) through Audible.com. He...

Book Review – Humanizing Data Strategy by Tiankai Feng

By

This book was making its rounds on social media, and the concept seems interesting...

Read the latest Blogs

Forums

DBATools in a agent job

By tuokek

Hi Dbatools is used to copy table data from domain a to domain b...

SQL server help (converting rows to columns)

By don075

I am using the following sql to convert rows into columns for each pid,...

Ingesting Data From REST API endpoints: Data Engineering with Fabric

By John Miner

Comments posted to this topic are about the item Ingesting Data From REST API...

Visit the forum

Question of the Day

The Hash Join I

What are the two inputs called to a hash join operation in SQL Server? (choose 2)

See possible answers