Bravin Wasike in DevOps Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security Strengthening Deployments and Runtime Protection In Part 1 of this series, we explored the foundational aspects of securing a DevOps... 22 April 2025 16 min read
Bravin Wasike in DevOps Securing the DevOps Pipeline Part 1: Tools and Strategies for Safer Deployments Protecting Your CI/CD from Build-Time Threats DevOps has transformed software delivery, but with rapid deployments come increased security risks. As... 12 March 2025 16 min read
Mercy Bassey in Security and Compliance Using Snyk for CI/CD Security Scanning Security is important regardless of your industry, whether it’s finance, retail, e-commerce, or the broader world of IT. A little... 16 January 2025 19 min read
Dennes Torres in Microsoft Fabric Granting Permissions in a Fabric Data Warehouse and Lakehouse We are becoming used to being a bit lazy when granting permissions to Data Warehouses and lakehouses in Fabric. We... 04 December 2024 4 min read
Microsoft Fabric Dennes Torres in Microsoft Fabric Using a Service Account in Microsoft Fabric Applications should never depend on user accounts for their own authentication. User accounts have unique security configurations, such as MFA... 16 October 2024 4 min read
Dennes Torres in Blogs Cloud Connections in Microsoft Fabric I wrote about cloud connections when they were in a very early stage. Cloud connections evolved and are now sharable.... 09 October 2024 4 min read
Blogs Dennes Torres in Blogs Workspace Identity and Resource Instance Rules: More than simple features Sometimes, when a new feature is announced, it’s in fact hiding bigger changes on the entire environment. This is exactly... 22 May 2024 3 min read
Blogs Dennes Torres in Blogs Azure OpenAI and RAG Security The most watched videos on my youtube channel are related to security. Azure SQL Networking Secrets and Cloud Security: Secure... 10 April 2024 3 min read
Blogs Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 1 – Introduction and Use Cases My initial goal of documenting and exploring SQL Server Row Level Security (RLS) was to show the basic functionality and... 01 August 2023 17 min read
Blogs Dennes Torres in Blogs .NET App Services: Containers or not containers, that’s the question The app services in the title can be function apps, web apps or more. We can deploy the app services... 30 August 2022 5 min read
MySQL Lukas Vileikis in MySQL Security in MySQL: Part Two There’s more to security in MySQL than user account privileges. In this article, Lukas Vileikis explains the other components of... 27 May 2022 10 min read
Blogs Dennes Torres in Blogs Azure and MFA Secrets MFA and conditional access policies are powerful tools for our cloud security, but they are full of tricks. I don’t... 27 December 2021 3 min read
Blogs Dennes Torres in Blogs Dynamic Data Mask is now useful and no one noticed it Dynamic data mask is a very interesting security feature allowing us to mask critical fields such as e-mail, phone number,... 22 November 2021 3 min read
Blogs Louis Davidson in Blogs Securing access to data for admin and dbo In this blog, I want to explore what you can do to block the owner of a database from doing... 19 March 2018 11 min read
.NET Dino Esposito in .NET Revisiting Script Injection in ASP.NET The danger of Cross-Site Scripting (XSS) has to be dealt with in any web application. You do this by validating... 05 July 2017 12 min read
T-SQL Programming Robert Sheldon in T-SQL Programming Encrypting SQL Server: Using an Encryption Hierarchy to Protect Column Data SQL Server Encryption is an essential part of what is required for protecting data. Column-level encryption can be a very... 13 December 2016 15 min read
Database DevOps William Brewer in Database DevOps Questions About SQL Server Security and Access Control You Were Too Shy to Ask For many developers, database security and Access control is just something that gets in the way of development work. However,... 04 November 2016 23 min read
Robert Sheldon The Logical Data Warehouse – Towards a Single View of All the Data What is wrong with the Enterprise Data Warehouse? Quite a lot, it seems. By taking the narrow view that the... 09 November 2015 14 min read
Tom Fischer Safe(r) Custom User-Authentication If you are still storing passwords with MD5 hashing you're doing it wrong. The .NET platform provides a Cryptography library... 12 June 2015 16 min read
Robert Sheldon How to Get SQL Server Security Horribly Wrong It is no good doing some or most of the aspects of SQL Server security right. You have to get... 29 April 2015 24 min read