You might think you know everything about SQL Injection. Many people think so. But, do you really understand every nuance? Find out if you do and discover why SQL Injection vulnerabilities are still so common.
Can you afford the immediate as well as the hidden cost of a data breach in your company? Find out now.
Privilege abuse comes in two forms: Abuse of excessive and of legitimate privileges. Discover how to protect your environment from this vulnerability.
LOB values are not always stored in the special LOB_DATA allocation unit. But, where else could they be? Discover the well-kept secret of the Inline LOB.
If you are searching for a quick and dirty way to encrypt data in SQL Server, the ENCRYPTBYPASSPHRASE function might be just what you are looking for.