Title Summary File
Credit Cards and Oracle: How to Comply with PCI-DSS

IOUG COLLABORATE 2011 - Credit card data breaches are headline news thus organizations must properly protect credit card data or risk being...

Security Resources File
Upcoming Webinar: Oracle Critical Patch Update April 2011 - Oracle Database Impact

Oracle April 2011 CPU - Oracle Database Impact...

Oracle Security Blog
Real-life Database Security Mistakes

IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one...

Security Resources File
Oracle Critical Patch Update April 2011 Pre-Release Analysis

Here is a brief analysis of the pre-release announcement for the...

COLLABORATE11 - IOUG Operation Classified: Security Hackfest

For those of you not familiar with COLLABORATE or have not previously attended, the Oracle Applications Users Group (OAUG) and Independent Oracle...

Real World Database Auditing

IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database...

Security Resources File
Spoofing Oracle Session Information

Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,...

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File
An Introduction to SQL Injection Attacks for Oracle Developers

Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database....

Security Resources File
Evading Network-Based Oracle Database Intrusion Detection Systems

With the advent of legislative mandates like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA), the...

Security Resources File

Pages