Database security

You may need to do a quick third-party registration to access certain ones.

Articles
  • Ten hacker tricks to exploit SQL Server systems
  • Do you need to harden SQL Server 2008 R2?
  • Meet compliance requirements with improved database security practices
  • Common oversights with SQL Server audits
  • The ultimate SQL Server security faux pas: Overlooked systems
  • Password cracking tools for SQL Server
  • The true value of transparent data encryption
  • The fine line between not encrypting your databases and breach notification
  • New security features in SQL Server 2008 leave some work for you
  • How insiders hack SQL databases with free tools and a little luck
  • Integrating source code analysis into your database security measures
  • SQL Server 2008 security and compliance features reduce security risks
  • Get your SQL Server security goals in order
  • How secure is your SQL Server network design?
  • Basic SQL Server security principles you can’t afford to miss
  • Why store sensitive data if you don’t have to?
  • Database security testing terms: Setting the record straight
  • SQL Server patching pros and cons
  • Six risky assumptions about SQL Server passwords
  • Database threats include unruly insiders
  • Protecting your database: Who’s looking at your sensitive data?
  • Software security tools to improve your skills in a single day
  • Enhance your SQL Server security skills with five quick steps
  • Database-related security policies to think about
  • Meet compliance with improved database security practices
  • Logging for security compliance in SQL Server
  • Step-by-Step Guide: Test for a Trojan horse on your SQL Server
  • Database security options to protect data in SQL Server
  • Harden code to prevent SQL injection
  • Ten IIS tips to lock down SQL Server
  • Encryption enhancements in SQL Server 2005
  • Tool to configure and lock down SQL Server 2005 services
  • Automate SQL injection testing
  • Checklist: How to test SQL Server security
  • Not upgrading? Keep SQL Server 2000 Secure
  • SQL Server’s emerging rootkit threat
Whitepapers

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: