Lukas Vileikis in Databases 4 CVEs are affecting Valkey databases. Here’s everything you need to know (and what you should do, right now, to protect yours) 4 CVEs currently affect Valkey databases. Learn what they are, which Valkey versions are vulnerable, and what you should do... 19 May 2026 7 min read 11
Simple Talk Editor in Data Security, Privacy, and Compliance In 2026, engineering teams are quietly accepting more risk. Here’s why 11 takeaways from the Simple Talk podcast on security vs speed in databases: why teams misjudge risk, how AI amplifies... 17 May 2026 4 min read 11
Lukas Vileikis in PostgreSQL PostgreSQL is removing MD5 authentication for passwords. Here’s what it means for your databases PostgreSQL is phasing out MD5 authentication across versions 18–21, replacing it with SCRAM-SHA-256. Here's what it means for your database... 15 May 2026 7 min read 3
Fabiano Amorim in SQL Server Cross-database ownership chaining in SQL Server: security risks, behavior, and privilege escalation explained Learn how cross-database ownership chaining works in SQL Server, how permissions are evaluated, and why it can introduce security risks... 13 April 2026 12 min read 2
Fabiano Amorim in SQL Server Exploiting SQL Server Date Correlation Optimization: How Tampered Backups Enable Cross‑Database Data Leaks This article reveals a critical SQL Server flaw: attackers can weaponize Date Correlation Optimization (DCO) views in restored backups to... 07 January 2026 19 min read 2
Fabiano Amorim in Data Security, Privacy, and Compliance SQL Server Privilege Escalation via Replication Jobs Learn how attackers can exploit SQL Server replication cleanup jobs to escalate privileges from db_owner to sysadmin, and discover practical... 22 December 2025 5 min read 31
Greg Low in SQL Server 15 Practical Tips for Securing SQL Server 15 practical, high-impact steps for securing your SQL Server environment.… 28 November 2025 5 min read 21
Fabiano Amorim in Data Security, Privacy, and Compliance SQL Server security vulnerabilities you weren’t aware of: DBaaS system code decryption & user data exfiltration A SQL Server DBaaS privilege bypass exposed system tables and vendor-protected code on AWS, GCP, and Alibaba. This explains the... 05 November 2025 30 min read 43
Bravin Wasike in DevOps Harden Kubernetes Security: DevOps Pipeline Guide Practical guide to hardening Kubernetes deployments and cloud security. Covers RBAC, network policies, pod security, IaC scanning with Checkov, runtime... 22 April 2025 16 min read 1
Bravin Wasike in DevOps Securing the DevOps Pipeline Part 1: Tools and Strategies for Safer Deployments Protecting Your CI/CD from Build-Time Threats DevOps has transformed software delivery, but with rapid deployments come increased security risks. As... 12 March 2025 16 min read
Mercy Bassey in Data Security, Privacy, and Compliance Using Snyk for CI/CD Security Scanning Security is important regardless of your industry, whether it’s finance, retail, e-commerce, or the broader world of IT. A little... 16 January 2025 19 min read
Dennes Torres in Microsoft Fabric Granting Permissions in a Fabric Data Warehouse and Lakehouse We are becoming used to being a bit lazy when granting permissions to Data Warehouses and lakehouses in Fabric. We... 04 December 2024 4 min read 1
Microsoft Fabric Dennes Torres in Microsoft Fabric Using a Service Account in Microsoft Fabric Applications should never depend on user accounts for their own authentication. User accounts have unique security configurations, such as MFA... 16 October 2024 4 min read 2
Dennes Torres in Blogs Cloud Connections in Microsoft Fabric I wrote about cloud connections when they were in a very early stage. Cloud connections evolved and are now sharable.... 09 October 2024 4 min read
Blogs Dennes Torres in Blogs Workspace Identity and Resource Instance Rules: More than simple features Sometimes, when a new feature is announced, it’s in fact hiding bigger changes on the entire environment. This is exactly... 22 May 2024 3 min read
Blogs Dennes Torres in Blogs Azure OpenAI and RAG Security The most watched videos on my youtube channel are related to security. Azure SQL Networking Secrets and Cloud Security: Secure... 10 April 2024 3 min read
SQL Server Ben Johnston in SQL Server A practical introduction to Row-Level Security in SQL Server (complete guide, part one) Row-Level Security in SQL Server lets identical queries return different rows per user. Here's how it works, when to use... 01 August 2023 16 min read
Blogs Dennes Torres in Blogs .NET App Services: Containers or not containers, that’s the question The app services in the title can be function apps, web apps or more. We can deploy the app services... 30 August 2022 5 min read
MySQL Lukas Vileikis in MySQL Security in MySQL: Part Two There’s more to security in MySQL than user account privileges. In this article, Lukas Vileikis explains the other components of... 27 May 2022 10 min read
Blogs Dennes Torres in Blogs Azure and MFA Secrets MFA and conditional access policies are powerful tools for our cloud security, but they are full of tricks. I don’t... 27 December 2021 3 min read