Tag Archives: encryption

Crack that Encrypted Data

Ransomware appears to be gaining some traction as a new trend. For awhile in my career, it was virus programs designed to send to all your contacts. Then it was infections to use your computer as part of a bot … Continue reading

Posted in Editorial | Tagged ,

Getting Started with Encryption in SQL Server 2016

The release of SQL Server 2016 gives developers a number of ways in which they can securely encrypt and protect their data. In this introductory session, you will learn about the encryption options in SQL Server 2016, watching Always Encrypted, … Continue reading

Posted in Presentations | Tagged , , , , ,

End to End Always Encrypted in SQL Server 2016

Abstract: Protecting our data from unauthorized access becomes more and more important all the time, however it has been difficult to ensure sensitive data is encrypted in SQL Server. The new Always Encrypted feature in SQL Server 2016 makes this … Continue reading

Posted in Presentations | Tagged ,

Quick Encryption with Always Encrypted

What do you need to do in order to access data in a SQL Server that’s encrypted with Always Encrypted? It’s not much, and it’s really simple. The certificate used for encryption A parameter in the connection string That’s it. … Continue reading

Posted in Blog | Tagged , ,

Create a Database Master Key–#SQLNewBlogger

Another post for me that is simple and hopefully serves as an example for people trying to get blogging as #SQLNewBloggers. One of the first things you need in a SQL Server database in order to implement encryption is a … Continue reading

Posted in Blog | Tagged , , , ,

SQL Server 2016: The Data Protection Version

I’ve spent a few years working with SQL Server encryption and security, trying to educate people on the various capabilities involved. There are some nice features available in the platform that can help you run a more secure SQL Server, … Continue reading

Posted in Editorial | Tagged , ,

Data for Ransom

Imagine you come into work and all of your database columns are encrypted. You have no idea what key was used, and your application can’t access the data. You receive a message that for a $100,000 payment, the decryption key … Continue reading

Posted in Editorial | Tagged ,

The $90,000 Laptop

A hospital got the opportunity to pay $90k for a lost laptop. There’s no excuse for this. If you have a Windows laptop, enable bitlocker today. If you have OSX, setup FileVault. If you’re on Linux, choose dm_crypt or something else. Go ahead, get that … Continue reading

Posted in Editorial | Tagged ,

The Auditor Attack Vector

The phone on the desk buzzed. The CEO picked it up, expecting his assistant to let him know his next appointment had arrived. Instead he was told a person had called and wanted to discuss why his managers were paid … Continue reading

Posted in Editorial | Tagged , | 3 Comments

T-SQL Tuesday #69–Encryption

This is a good T-SQL Tuesday topic for me. This month Ken Wilson asks everyone to write on encryption, which is a topic I’ve presented on quite a few times. You can participate, too. Take a few hours, learn something, … Continue reading

Posted in Blog | Tagged , , ,