Email Alerts
-
Outsourcing IT services: Is it worth the security risk?
Kevin Beaver examines the risks to consider when contemplating outsourcing your IT services. Tip
-
Hot Pick: SQL Guard
Learn how Guardium's SQL Guard defends the underlying database code and engines from external attacks and internal misuse by monitoring traffic for illegal and malicious activity. Tip
-
Security issues of using shared code
Security pros need to be aware of code that is being "borrowed" for custom applications. Tip
-
Five tips for secure database development
A look at some of the specific security issues that impact the application development process. Tip
-
SQL Server user-security checklist
Here are a few quick steps to assess the security of user accounts/permissions on your SQL Server. Tip
-
SQL Server Security: Chapter 2, Under Siege: How SQL Server is Hacked
This excerpt is from Chapter 2, Under Siege: How SQL Server is Hacked from SQL Server Security by David Litchfield. Tip
-
Preventing SQL Injections
How to guard your Web apps against SQL injection attacks. Tip
-
Legislative mandates and cyber threats demand secured networks
Storage security expert Vijay Ahuja has tips on how to insure your critical data is secure and safe from attacks. Tip
-
Storage security mantras: Compatibility and interoperability
A storage expert discusses the importance of compatibility and interoperability. Tip
-
SQL Server security
This tip describes the two-part process of SQL Server security. Tip
Security Management Strategies for the CIO