Security and compliance
Ensure data security and compliance with data masking, monitoring, and change traceability

Phil Factor (real name withheld to protect the guilty), aka Database Mole, has 30 years of experience with database-intensive applications. Despite having once been shouted at by a furious Bill Gates at an exhibition in the early 1980s, he has remained resolutely anonymous throughout his career. He is a regular contributor to <strong><a href="http://www.simple-talk.com/" target="_blank" rel="noopener">Simple Talk</a></strong> and <strong><a href="http://www.sqlservercentral.com/" target="_blank" rel="noopener">SQLServerCentral</a></strong>.
(MAX) specification, which is a mistake too. Phil Factor explains the dangers and then offers a workaround for the problem, when… Read moreExecute(string) to execute a batch in a string, often assembled dynamically from user input. This technique is dangerous because the parameter values are injected before the statement is parsed by SQL Server, allowing an attacker to "tag on"… Read moreFOREIGN KEY or CHECK constraints in your databases will degrade data consistency and integrity and can cause query performance problems. Phil Factor explains how to detect these and other table-related issues, during development, before they cause trouble further down the line. Read more