Security Information and Event Management | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified In the previous blog of this series, we discussed how monitoring SQL Server activities...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logs Over 44 records are stolen per second every day due to data breaches, and according to the...
Security Information and Event Management | July 6, 2018Learn how to audit and secure your SQL and IIS servers Virtually every business today depends on databases and web servers for daily operations....