Phil Factor Schema-Based Access Control for SQL Server Databases Access-control within the database is important for the security of data, but it should be simple to implement. It is... 09 April 2015 25 min read
Nick Harrison ASP.NET MVC Security through Validation ASP.NET MVC provides a way of providing declarative validation of user inputs. It removes a lot of the tedium of... 20 January 2015 13 min read
Joshua Feierman The Mindset of the Enterprise DBA: Delegating Work A lot of the routine jobs demanded of a DBA can be automated, but a tougher prospect is to automate... 17 October 2014 19 min read
David Njoku Introduction to Oracle Password Verification and Complexity Function Security is in the news again. It seems there’s no greater click-bait than a story about indecent photos of beautiful... 16 September 2014 5 min read
Saurabh Dhoble Setting Up Your SQL Server Agent Correctly It is important to set up SQL Server Agent Security on the principles of 'executing with minimum privileges', and ensure... 28 May 2014 15 min read
Buck Woody Which New Technology Should I Chase? It is a question that almost anybody working in IT occasionally ask themselves. 'How can I best develop my career... 06 May 2014 18 min read
Kevin Feasel SQL Injection: How it Works and How to Thwart it This article is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how... 24 April 2014 33 min read
Syed Jaffar Hussain How is data security maintained and what’s new in Oracle 12c database security – Part 1 Securing enterprise business-critical data is as important for DBAs as database tuning and data protection. Oracle provides comprehensive and powerful... 16 April 2014 5 min read
Dino Esposito Thoughts on ASP.NET MVC Authorization and Security It is only a matter of time in developing most websites that you'll need to implement a way of restricting... 22 July 2013 11 min read
Feodor Georgiev Collecting the Information in the Default Trace The default trace is still the best way of getting important information to provide a security audit of SQL Server,... 02 July 2013 14 min read
Alexander Karmanov An Incremental Database Development and Deployment Framework Often, an existing database application must evolve quickly by incremental steps. Alex describes a tried and tested system to provide... 12 February 2013 27 min read
Bert Jan van der Steeg Database Management for SharePoint 2010 With each revision, SharePoint becomes more a SQL Server Database application, with everything that implies for planning and deployment. There... 10 May 2011 13 min read
Timothy Wiseman SQL Injection: Defense in Depth So much has been written about SQL Injection, yet such attacks continue to succeed, even against security consultants' websites. The... 17 March 2011 11 min read
Wesley David Game-over! Gaining Physical access to a computer Security requires defense in depth. The cleverest intrusion detection system, combined with the best antivirus, won't help you if a... 15 March 2011 11 min read
Feodor Georgiev The default trace in SQL Server – the power of performance and security auditing Since the introduction of SQL Server 2005, there is a simple lightweight trace that is left running by default on... 14 March 2011 17 min read
Matteo Slaviero Code Access Security in ASP.NET 4.0 In the third, and final article that introduces Code Access Security in .NET Framework 4.0, Matteo explains, with examples, how... 14 September 2010 18 min read
Matteo Slaviero What’s New in Code Access Security in .NET Framework 4.0 – Part 2 Having introduced us to the basics of the new Code Access Security Model available in .NET Framework 4.0, Matteo Slaviero... 13 July 2010 24 min read
Matteo Slaviero What’s New in Code Access Security in .NET Framework 4.0 – Part I The Code Access Security model has been completely redesigned in the .NET Framework 4.0, to the point where CAS policies... 15 June 2010 24 min read
Elie Bou Issa An Introduction to Information Rights Management in Exchange 2010 If you're a Systems Administrator concerned about information security, you could do worse than implementing Microsoft's Information Rights Management system;... 06 May 2010 12 min read
Elie Bou Issa Getting Started with Active Directory Rights Management Services for Exchange 2010 With security concerns being a constant litany, it's worth considering Active Directory Rights Management Services as a powerful tool in... 06 April 2010 13 min read