Understanding SQL Server Security Function HAS_Permis_BY_Name and Its USE Cases
There are multiple instances when we want to check the permission on a securable for a principal....
Understanding SQL Server Lockdown to Secure Database Environment
Security is the main concern these days in every sector. Database Security is also a major worry for any customer. SQL Server is designed...
Connecting a Bastion Server to a PostgreSQL Server via SSH Tunnel
PostgreSQL is a well-known relational database management system that boasts a secure environment for developers and users. But as remote...
How to Protect MySQL Databases from Ransomware Campaigns
MySQL is known for being easy to use and highly secure. That’s why it is the number one choice...
How to Connect to Azure SQL Database Securely
As a database administrator, I started my journey in deploying managed SQL databases on the cloud, and I highly recommend deploying Azure...
SQL Vulnerability Assessment
SQL Vulnerability Assessment is a feature available in the latest versions of SQL Server Management Studio (SSMS). This feature is very...
In-depth Exploration of Row Level Security
Introduction Organizations are becoming more and more concerned about how to reduce the cost of...
Introduction to Row-Level Security in SQL Server
Why Row Level Security Matters? Prior to SQL Server 2016, table-level security was the default lowest level of security for a database. In...
Oracle Database Security: Database Auditing
In this article, I will continue with Oracle Database Security and I will present some important facts about standard database auditing,...
Database Security in Oracle
There is no secret that information makes the world go around currently. If an enterprise takes...