Title | Summary | File | |
---|---|---|---|
Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite |
Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application... |
Security Resources | File |
Eight Key Components of a Database Security Risk Assessment |
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the... |
Security Resources | File |
The Thrifty DBAs Guide to Open Source Database Security Tools |
To properly secure an Oracle database requires significant effort and often expensive security add-on products. The Thrifty DBA likes having... |
Security Resources | File |
The Tools Hackers Are Using Against Your Oracle Database |
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable... |
Security Resources | File |
Change Your Thinking About Security with Oracle Database in the Cloud |
How does database security change when you move to the Cloud? Security does change and how to handle database security needs to change when... |
Security Resources | File |
Leveraging New Oracle Database 19c Security Features with the Oracle E-Business Suite |
Oracle 19c database is now certified with the E-Business Suite. Oracle 19c delivers several new important security features that will be of value... |
Security Resources | File |
Effective Auditing and Logging in Oracle E-Business Suite |
The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most... |
Security Resources | File |
Oracle E Business Suite and Java Security What You Need to Know |
"Java is the biggest vulnerability for US computers" states CSO Magazine. The Oracle E-Business Suite (EBS) runs on Java - both the server and... |
Security Resources | File |
Hacking an Oracle Database and How to Prevent It |
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable... |
Security Resources | File |
GDPR Compliance and the Oracle E-Business Suite Revisited |
Enforcement of the European Union’s General Data Protection Regulation (GDPR) began on May 25, 2018, and this extensive new privacy law impacts... |
Security Resources | File |