Feed SQL Server logs into SIEM
Keeping track of all the security related logs can be hard. Using your security team to shoulder some of the load can help. Learn how in this article.
2024-12-16
3,780 reads
Keeping track of all the security related logs can be hard. Using your security team to shoulder some of the load can help. Learn how in this article.
2024-12-16
3,780 reads
In this article, we look at how to audit and monitor the use of SQL Server extended stored procedures in your database instance.
2024-10-28
This continues my series on auditing SQL Server. The fist parts covered discovery and documentation, server level hardware audits and SQL Server engine level audits. This section examines database configuration audits.
2024-09-18
This section gets into detailed SQL Server configuration details. This is less relevant in a cloud environment, but there are still items to confirm.
2024-08-21
This is the second part of my series on auditing SQL Server. In the first part, I discussed basic server discovery and documentation. It covered some items to check at the hardware level and configuration items, but this section gets into more detailed hardware auditing details.
2024-08-07
Your challenge for this week was to find out who keeps mangling the contents of the AboutMe column in the Stack Overflow database.
2024-06-03
2024-02-21
409 reads
An audit finding relating to production data, containing customer identifiable data, in a UAT environment, prompted this simple script, which completely scrambles data in such a way that the original value can not be reconstituted.
2023-05-24 (first published: 2023-05-19)
910 reads
2023-03-27
315 reads
I have worked in more than one regulated industry, and since the banking crisis of 2008, I have witnessed a sea change in the approach to regulation. The UK Financial Services Authority (FSA) was seen to be a toothless tiger. The UK government replaced the FSA with two separate bodies, each with its own more […]
2021-10-25
1,582 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
Comments posted to this topic are about the item Using PostgreSQL as a NoSQL...
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers