Fabiano Amorim in SQL Server Cross-database ownership chaining in SQL Server: security risks, behavior, and privilege escalation explained Learn how cross-database ownership chaining works in SQL Server, how permissions are evaluated, and why it can introduce security risks... 13 April 2026 12 min read
Lukas Vileikis in Security and Compliance Everything you need to know about MongoBleed (CVE-2025-14847) Learn what MongoBleed (CVE-2025-14847) is, how the vulnerability leaks MongoDB server memory, which versions are affected, and how to protect... 08 April 2026 6 min read 1
Umair Shahid in Cloud Why the cloud is not a disaster recovery strategy for your critical databases Cloud isn’t a disaster recovery plan. Learn why multi-AZ and managed services aren’t enough, and how RTO, RPO, backups, and... 13 March 2026 8 min read 2
Lukas Vileikis in Security and Compliance How to secure MySQL and PostgreSQL in the world of AI Learn how AI is transforming database security and discover best practices to secure MySQL and PostgreSQL against AI-driven threats, faster... 04 March 2026 11 min read 11
Greg Low in SQL Server 15 Practical Tips for Securing SQL Server 15 practical, high-impact steps for securing your SQL Server environment.… 28 November 2025 5 min read 21
Fabiano Amorim in Security and Compliance SQL Server DBaaS Vulnerability: Decrypting System Code & Exfiltrating User Data A SQL Server DBaaS privilege bypass exposed system tables and vendor-protected code on AWS, GCP, and Alibaba. This explains the... 05 November 2025 30 min read 43
Goodness Woke in AI Zero-Trust Architecture Best Practices for AI Cloud Deployments The connection of artificial intelligence and cloud computing has produced previously unattainable chances for creativity while simultaneously introducing complex security... 26 June 2025 20 min read
Goodness Woke in Security and Compliance Zero-Trust Architecture for Cloud-Based AI Systems Cloud-based artificial intelligence’s growth has transformed how businesses analyze data and get insights, but it has also brought with it... 27 May 2025 25 min read 1
Mercy Bassey in Security and Compliance Using Snyk for CI/CD Security Scanning Security is important regardless of your industry, whether it’s finance, retail, e-commerce, or the broader world of IT. A little... 16 January 2025 19 min read
Robert Sheldon in Security and Compliance Protecting your Cloud Assets Organizations of all types and sizes are turning to the cloud for their application and data storage requirements. The cloud... 18 October 2023 21 min read
Security Robert Sheldon in Security Cybersecurity threats Not a week goes by without news of a new cyberattack. In this article, Robert Sheldon explains the cybersecurity threats... 30 September 2021 12 min read
.NET Rishit Mishra in .NET Securing Web Application Secrets Through Azure Key Vault Azure Key Vault is a service for storing securely certificates, credentials, connection strings, and more. In this article, Rishit Mishra... 12 August 2020 12 min read
Security and Compliance Vasanth Makam in Security and Compliance Why Organizations Need to Pay Attention to Cloud Security As organisations move to cloud platforms like Azure and AWS, understanding security is more important than ever. In this article,... 21 April 2020 10 min read
Database Administration Joshua Feierman in Database Administration How to Use SQL Audit and Azure Log Analytics to Comply with Audit Rules You can use SQL Audit to record changes to security, access to tables, and more to help you meet compliance... 09 September 2019 16 min read