DB2 LUW Security Tips and Best Practices
Beat the odds with these simple steps...
In episode #30, special guest Rebecca Bond, CISSP, published author, and independent DB2 Security consultant shared with us some simple steps, sample SQL commands, tips, and best practices for securing your organization's DB2 LUW data assets. Watch the replay to learn from her wisdom...
We'd also like to bring to your attention our upcoming shows:
- OCT 8 - The DB2Night Show goes "Cross Platform" with special guest Sheryl Larsen. Sheryl will share SQL performance lessons learned from recent consulting engagements and offer tips for both DB2 z/OS and LUW!
- OCT 15 - DB2 LUW Performance Tuning Lessons Learned with special guest Martin Hubel, IBM DB2 GOLD Consultant. Really - you don't want to miss this - even if you don't have SAP!
- NOV 5 - The SQL Snapshot Potluck Party is BACK! Share your favorite SQL Snapshot command and receive the source code for the entire collection!
- NOV 19 - What's new and COOL with DB2 LUW with guest George Baklarz, IBM
Finally, also on October 8th at 2pm Central, DBI is offering a free Webinar "TEN SQL Snapshot commands you MUST run TODAY!" - this is a derivative work of Scott Hayes' IDUG Regional technical session. Attendees will receive the SOURCE CODE for these invaluable commands. DETAILS and REGISTRATION.
[ more .. ]