Data inference allows attackers to infer protected information from legitimately accessible data. Read on to find out what data inference entails and how you can protect your data.
A weak audit trail makes a post-breach-investigation hard. Discover how an effective strategy can act as a deterrent and might be a regulatory requirement.
Do you have a large number of SQL Server to manage? Read on to discover five ways to manage all your SA passwords and their unique advantages and disadvantages.
T-SQL Tuesday was invented almost 5 years ago by Adam Machanic. This month is the 58th episode and the topic is: “Passwords”. Read on to discover what #tsql2sday is all about and what you have to do to participate in this exciting blog-party.
Backups are a common cause for data breaches. Read on to find out, why strategies designed to protect the sensitive data within your database are often inadequate to provide the same protection within a backup.