Tag Archives: security

Audio Attacks

There are running jokes about how Amazon Alexa and Google Home are susceptible to visitors in your home. It’s become a bit of test from some geeks who will walk in your house and call “Hey, Alexa” out loud to … Continue reading

Posted in Editorial | Tagged | Leave a comment

Security and Patching Struggles

A couple weeks ago we had a huge security issue with the WannaCry ransomware racing across the world. I was out of the office, and mostly offline, so I was a bit out of touch. However, many organizations were affected, … Continue reading

Posted in Editorial | Tagged , , | Leave a comment

The Secret Password

As I work with more server systems that help developers run Continuous Integration and automated releases, one of the things I see used often are variables. These are values you can set for a particular process and reference inside of … Continue reading

Posted in Editorial | Tagged , | Leave a comment

The Value of Your Personal Data

Years ago I read Being Digital by Nicholas Negroponte of MIT. In the book, he relates a story about crossing the border from the US into Canada and a Border Patrol agent asking the value of his laptop. He said … Continue reading

Posted in Editorial | Tagged | Leave a comment

Hacked

Hacked By Steve Jones, 2013/01/02 This editorial was originally published on Jan 2, 2013. It is being rerun as Steve is out of the office. I’ve been hacked before. My personal web site has been hacked with a variety of … Continue reading

Posted in Editorial | Tagged | 1 Comment

I Hate To Send This Email

I use TrueDelta to report my car status every month. It’s a nice service, allowing car owners to see what experiences others have, and think about which models and years might be a good fit for me. I’ve tracked multiple … Continue reading

Posted in Editorial | Tagged , | Leave a comment

The Secure Medical Data Challenge

Securing our databases and preventing the release of information our organizations have collected is an ongoing job for many of us. We patch our systems, ensure that our logins and users are granted just a few rights, encrypt data and … Continue reading

Posted in Editorial | Tagged

Why Devops? For Better Security

The ideas of DevOps are a mixture of principles, ideas, recommendations, tools, processes, attitudes, and more. There isn’t any  one way to implement a DevOps process, and plenty of people have been working in what many would consider a DevOps … Continue reading

Posted in Editorial | Tagged ,

Let NonAdmins Get Logins

I saw a question recently about how to allow some users to see the logins on a server without being a sysadmin or securityadmin. This was in support of a migration effort, so users needed read rights without being able … Continue reading

Posted in Blog | Tagged , ,

Using a DMK in TDE

When you setup TDE, you need to create a DMK (Database Master Key) in the master database if one doesn’t exist. This key forms the basis of a chain of protection for your data inside of the SQL Server instance. … Continue reading

Posted in Blog | Tagged , , ,