Title Summary File
Hacking an Oracle Database and How to Prevent It

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable...

Security Resources File
Integrigy at Oracle Open World 2017

Integrigy will be presenting again this year on database security at Oracle Open World 2017 (San Francisco, October 1-5).  If you will be...

Oracle Security Blog
SCAP OVAL SQL57_TEST Example For Oracle E-Business Suite

Last week I posted a blog introducing SCAP and OVAL. Here is a quick follow-up with a link to a sql57_test example using the Oracle E-...

Oracle Security Blog
SCAP OVAL Oracle SQL57_TEST Example

The attached is a SCAP OVAL sql57_test example for the Oracle E-Business Suite - it will suffice for any Oracle database. To use the attached,...

Whitepapers and Presentations File
STIGS, SCAP, OVAL, Oracle Databases and ERP Security

Last week’s unprecedented ransomware cyber attacks (...

Oracle Security Blog
SCAP OVAL Example Check for Oracle

The attached is a SCAP OVAL example Check for Oracle RDBMS. Please use it for testing and demonstration purposes only. To use the attached, ...

File
The Thrifty DBA Does Database Security

...

Whitepapers and Presentations File
Oracle Unified Auditing Performance Issues and 12.2 Improvements

For those of you using and/or considering Unified Auditing, in case you might have missed, Oracle has made significant changes to Unified Auditing...

Oracle Security Blog
Oracle Audit Trail Add Program Name

The program name attribute (V$SESSION.PROGRAM) is not by default passed to Oracle’s audit logs. It can be optionally included. To do so, apply...

Oracle Security Blog
Oracle Data Definition Language (DDL) Auditing

Relational databases use DDL statements to define structures such as tables to store data and functions to store code. Monitoring, auditing and...

Whitepapers and Presentations File

Pages