Data inference allows attackers to infer protected information from legitimately accessible data. Read on to find out what data inference entails and how you can protect your data.
A weak audit trail makes a post-breach-investigation hard. Discover how an effective strategy can act as a deterrent and might be a regulatory requirement.
Encrypting important data is not enough. You also need to handle the encryption keys correctly. Read on to see what flawed key management can result in.
Last week was the 58th #tsql2sday party and 11 people showed up. There were exciting discussions about password strength, password management, hashing and more. Read on to see what everyone contributed.
Do you have a large number of SQL Server to manage? Read on to discover five ways to manage all your SA passwords and their unique advantages and disadvantages.