Tag Archives: security

Internal Controls

I was browsing the Internet and stumbled on a small part of a larger story that struck me. Many of you may have heard of the story of Jamal Khashoggi, the journalist for the Washington Post that was killed. I … Continue reading

Posted in Editorial | Tagged , | Leave a comment

Republish: Data Breach Danger

In Seattle today, delivering two talks, so you get a republish of Data Breach Danger.

Posted in Editorial | Tagged , | Leave a comment

The Security Weak Link

I saw this cartoon, which I think is great: Data Security. It’s from John Klossner, and it perfectly shows that humans are, and probably always will be, a weak link. I look at this in two ways. First, we need … Continue reading

Posted in Blog | Tagged , | Leave a comment

Deleting a User that Owns a Schema

This was an interesting question I saw posted recently. Through SQL Server 2000, trying to delete a user that owned objects was a pain. We had to actually rebuild all the objects, which was problematic. With SQL Server 2005 and … Continue reading

Posted in Blog | Tagged , | 1 Comment

Protecting Our Stream of Data

Protecting the data our companies collect is important. Many of us go to great lengths to secure our databases, firewall connections, limit access, and more. However, we can’t secure the data before it gets to us, and that can be … Continue reading

Posted in Editorial | Tagged | 1 Comment

The Weakest Link

I noticed another data breach recently. This breach was from PageUp, a firm that helps companies find employees. This means that they have lots of information, potentially PII data, and some of it might be out there. Since they provide job … Continue reading

Posted in Editorial | Tagged | Leave a comment

Getting the Role Permissions–#SQLNewBlogger

Another post for me that is simple and hopefully serves as an example for people trying to get blogging as #SQLNewBloggers. If you are wondering what permissions a role has, and don’t want to spend time searching and digging through … Continue reading

Posted in Blog | Tagged , ,

Granting CONTROL on a database–#SQLNewBlogger

Another post for me that is simple and hopefully serves as an example for people trying to get blogging as #SQLNewBloggers. I wanted to grant a login the CONTROL permission on a database. This wasn’t a simple as I expected. … Continue reading

Posted in Blog | Tagged , | 4 Comments

The Combinations of Software

Security issues seem to be appearing more frequently, not less. I’d expect that we would be getting better at writing software, and I think many of us are. The problem is that more and more people are writing software and … Continue reading

Posted in Editorial | Tagged ,

Storage that Expires

Whether you like the idea of the GDPR (and the new California law), I’m sure you agree that these laws will likely change our data handling in business. Even if they are weakened through legal challenges, many companies have already started to comply … Continue reading

Posted in Editorial | Tagged , , | 1 Comment