Oracle Database Security Primer: Fourth Edition Just Released!
Oracle » Cloud Security Perspectives and Insights
by Russ Lowenthal
3y ago
We now live in a dramatically different world where every piece of data is online and is relentlessly attacked 24x7. Attackers target databases by exploiting unpatched vulnerabilities and misconfigurations. Attacks also target weaknesses in database user configuration, supporting network, and IT infrastructure to compromise the database. Organizations react by assigning the responsibility of securing the databases to the VPs, Directors, or Architects of data management, risk/compliance managers, or network security teams. At Oracle, we feel it is critical to raise awareness among these decisio ..read more
Visit website
It's National Identity Management Day: Do You Know Where Your Identities Are?
Oracle » Cloud Security Perspectives and Insights
by Greg Jensen
3y ago
It’s April 13th…do you know where your identities are? April 13th is not just an excuse to have a once a year reflection on the role “identity” plays, but an annual reminder that we need to place a focus each and every day on this critical component of IT and security.  Most will look at identity as a solution to manage our email credentials, or our Windows logins. Maybe some of those new cloud services the company is deploying. But it’s so much more than that. As I sit in my home today, I have literally dozens and dozens of points of connectivity to the internet. Refrigerators ..read more
Visit website
Oracle Identity and Access Management 12c Upgrade Factory
Oracle » Cloud Security Perspectives and Insights
by Sandeep Banerjie
3y ago
Organizations want to reduce complexity and achieve more control across an increasingly complicated technology landscape. The dynamics and logistics are becoming more pronounced as companies shift their physical and virtual boundaries, expand their applications and user workloads across cloud and on-premises, and face evolving compliance and regulatory requirements. Organizations are adapting their identity infrastructure as the new control plane to address these security, identity, and compliance changes. So, you may ask why Oracle for this new control plane? Oracle has decades of experience ..read more
Visit website
Using IP rules to access Autonomous Database-Shared
Oracle » Cloud Security Perspectives and Insights
by Guest Author
3y ago
..read more
Visit website
Available now! The third and final, publicly available CAIQ for Oracle Cloud Applications
Oracle » Cloud Security Perspectives and Insights
by David B. Cross
3y ago
For this posting, I have an additional contributing guest author Steve Enevold, who is a Senior Director in the Oracle SaaS Engineering organization. Oracle SaaS Engineering, responsible for providing information to customers and prospects about how Oracle services are securely managed, is excited to announce the availability of the CAIQ for Oracle Cloud Applications. This is the third and final CAIQ - we recently published CAIQ for Oracle Fusion Cloud Applications and CAIQ for Oracle Enterprise Performance Management (EPM) Cloud Applications - so we now have CAIQs for all of our maj ..read more
Visit website
Identity Weaknesses and Prevent Attacks with Oracle Cloud Infrastructure Vulnerability Scanning ...
Oracle » Cloud Security Perspectives and Insights
by Jim Smith
3y ago
Security should be easier for customers to implement and maintain; this is at the core of Oracle’s approach to cloud security. Customers want more than just a guideline from their cloud provider; they want a proactive approach that allows them to more quickly achieve a stronger security posture for their applications and infrastructure. This what the Oracle Cloud Infrastructure (OCI) Vulnerability Scanning Service (VSS) provides - a simple, on by default, prescriptive, and free scanning suite that is tightly integrated with the OCI platform. The scanning service provides de ..read more
Visit website
Available now! The third and final, publicly available CIAQ for Oracle Cloud Applications
Oracle » Cloud Security Perspectives and Insights
by David B. Cross
3y ago
For this posting, I have an additional contributing guest author Steve Enevold, who is a Senior Director in the Oracle SaaS Engineering organization. Oracle SaaS Engineering, responsible for providing information to customers and prospects about how Oracle services are securely managed, is excited to announce the availability of the CAIQ for Oracle Cloud Applications. This is the third and final CAIQ - we recently published CAIQ for Oracle Fusion Cloud Applications and CAIQ for Oracle Enterprise Performance Management (EPM) Cloud Applications - so we now have CAIQs for all of our maj ..read more
Visit website
Announcing Cross Region Replication for Keys in Oracle Cloud Infrastructure Vault
Oracle » Cloud Security Perspectives and Insights
by FREDERICK BOSCO
3y ago
Oracle Cloud Infrastructure (OCI) Vault is a fully managed key and secret management service that lets organizations control keys and secrets that protect their data. Vault is currently a region-specific service where keys and secrets are stored only in the OCI region where it is created. These keys and secrets are resilient to failures within the region and are backed by an availability Service Level Agreement (SLA) from Oracle. We are excited to announce the general availability of the Cross Region Replication (CRR) feature for keys in OCI Vault service. Organizations now have the flexibilit ..read more
Visit website
Managing situational permissions to Oracle Cloud resources via OCI IAM Roles
Oracle » Cloud Security Perspectives and Insights
by Matthew Flynn
3y ago
In the world of business technology, the requirements for certain permissions are obvious. All employees should, for example, be able to logon to their workstations and they should have access to the IT help desk application to submit tickets when they need help. Other permissions are more situational in nature and require a little nuance. For example, maybe your operations team wants to limit restarts of cloud compute instances to a specific time period (like 3am-5am) to avoid interruptions or business risk. OCI IAM policies enable these types of situational restrictions via time-based and ne ..read more
Visit website
Announcing Cross Region Replication for Keys in Oracle Cloud Infrastructure Vault
Oracle » Cloud Security Perspectives and Insights
by FREDERICK BOSCO
3y ago
Oracle Cloud Infrastructure (OCI) Vault is a fully managed key and secret management service that lets organizations control keys and secrets that protect their data. Vault is currently a region-specific service where keys and secrets are stored only in the OCI region where it is created. These keys and secrets are resilient to failures within the region and are backed by an availability Service Level Agreement (SLA) from Oracle. We are excited to announce the general availability of the Cross Region Replication (CRR) feature for keys in OCI Vault service. Organizations now have the flexibilit ..read more
Visit website

Follow Oracle » Cloud Security Perspectives and Insights on FeedSpot

Continue with Google
Continue with Apple
OR