Greg Low in SQL Server 15 Practical Tips for Securing SQL Server 15 practical, high-impact steps for securing your SQL Server environment.… 28 November 2025 5 min read 21
Fabiano Amorim in Security and Compliance SQL Server DBaaS Vulnerability: Decrypting System Code & Exfiltrating User Data A SQL Server DBaaS privilege bypass exposed system tables and vendor-protected code on AWS, GCP, and Alibaba. This explains the... 05 November 2025 30 min read 32
Bravin Wasike in DevOps Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security Strengthening Deployments and Runtime Protection In Part 1 of this series, we explored the foundational aspects of securing a DevOps... 22 April 2025 16 min read 1
Bravin Wasike in DevOps Securing the DevOps Pipeline Part 1: Tools and Strategies for Safer Deployments Protecting Your CI/CD from Build-Time Threats DevOps has transformed software delivery, but with rapid deployments come increased security risks. As... 12 March 2025 16 min read
Mercy Bassey in Security and Compliance Using Snyk for CI/CD Security Scanning Security is important regardless of your industry, whether it’s finance, retail, e-commerce, or the broader world of IT. A little... 16 January 2025 19 min read
Dennes Torres in Microsoft Fabric Granting Permissions in a Fabric Data Warehouse and Lakehouse We are becoming used to being a bit lazy when granting permissions to Data Warehouses and lakehouses in Fabric. We... 04 December 2024 4 min read 1
Microsoft Fabric Dennes Torres in Microsoft Fabric Using a Service Account in Microsoft Fabric Applications should never depend on user accounts for their own authentication. User accounts have unique security configurations, such as MFA... 16 October 2024 4 min read 1
Dennes Torres in Blogs Cloud Connections in Microsoft Fabric I wrote about cloud connections when they were in a very early stage. Cloud connections evolved and are now sharable.... 09 October 2024 4 min read
Blogs Dennes Torres in Blogs Workspace Identity and Resource Instance Rules: More than simple features Sometimes, when a new feature is announced, it’s in fact hiding bigger changes on the entire environment. This is exactly... 22 May 2024 3 min read
Blogs Dennes Torres in Blogs Azure OpenAI and RAG Security The most watched videos on my youtube channel are related to security. Azure SQL Networking Secrets and Cloud Security: Secure... 10 April 2024 3 min read
Blogs Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 1 – Introduction and Use Cases My initial goal of documenting and exploring SQL Server Row Level Security (RLS) was to show the basic functionality and... 01 August 2023 17 min read
Blogs Dennes Torres in Blogs .NET App Services: Containers or not containers, that’s the question The app services in the title can be function apps, web apps or more. We can deploy the app services... 30 August 2022 5 min read
MySQL Lukas Vileikis in MySQL Security in MySQL: Part Two There’s more to security in MySQL than user account privileges. In this article, Lukas Vileikis explains the other components of... 27 May 2022 10 min read
Blogs Dennes Torres in Blogs Azure and MFA Secrets MFA and conditional access policies are powerful tools for our cloud security, but they are full of tricks. I don’t... 27 December 2021 3 min read
Blogs Dennes Torres in Blogs Dynamic Data Mask is now useful and no one noticed it Dynamic data mask is a very interesting security feature allowing us to mask critical fields such as e-mail, phone number,... 22 November 2021 3 min read
Blogs Louis Davidson in Blogs Securing access to data for admin and dbo In this blog, I want to explore what you can do to block the owner of a database from doing... 19 March 2018 11 min read
.NET Dino Esposito in .NET Revisiting Script Injection in ASP.NET The danger of Cross-Site Scripting (XSS) has to be dealt with in any web application. You do this by validating... 05 July 2017 12 min read
T-SQL Programming Robert Sheldon in T-SQL Programming Encrypting SQL Server: Using an Encryption Hierarchy to Protect Column Data SQL Server Encryption is an essential part of what is required for protecting data. Column-level encryption can be a very... 13 December 2016 15 min read
Database DevOps William Brewer in Database DevOps Questions About SQL Server Security and Access Control You Were Too Shy to Ask For many developers, database security and Access control is just something that gets in the way of development work. However,... 04 November 2016 23 min read
Robert Sheldon The Logical Data Warehouse – Towards a Single View of All the Data What is wrong with the Enterprise Data Warehouse? Quite a lot, it seems. By taking the narrow view that the... 09 November 2015 14 min read