A weak audit trail makes a post-breach-investigation hard. Discover how an effective strategy can act as a deterrent and might be a regulatory requirement.
Encrypting important data is not enough. You also need to handle the encryption keys correctly. Read on to see what flawed key management can result in.
Last week was the 58th #tsql2sday party and 11 people showed up. There were exciting discussions about password strength, password management, hashing and more. Read on to see what everyone contributed.
Do you have a large number of SQL Server to manage? Read on to discover five ways to manage all your SA passwords and their unique advantages and disadvantages.
T-SQL Tuesday was invented almost 5 years ago by Adam Machanic. This month is the 58th episode and the topic is: “Passwords”. Read on to discover what #tsql2sday is all about and what you have to do to participate in this exciting blog-party.