How to grant PowerBI Service Workspace access using PowerShell
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
809 reads
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
809 reads
2022-05-25
422 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
Project Zero from Google aims to study zero day vulnerabilities. Steve hopes it leads to better security.
2022-05-04
91 reads
2022-04-22
414 reads
Having a known and documented incident response plan is important these days, as more and more companies are having security incidents.
2022-04-06
107 reads
2022-03-26
88 reads
How comfortable are you with your password security? Today Steve asks given some data on the various times it takes to crack passwords.
2022-03-25
75 reads
While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]
2022-03-02
4,502 reads
A reminder today that security in the physical world can affect the digital world.
2022-02-23
123 reads
Are you ready to take your SQL skills from theoretical to tactical? If you've...
By Steve Jones
Note: I DO NOT recommend this. Any changes to a pipeline should be in...
By Steve Jones
symptomania – n. the fantasy that there’s some elaborate diagnosis out there that neatly...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers