Title Summary File
Real-life Database Security Mistakes

IOUG COLLABORATE 2011 - You did everything by the book followed the database security checklists and implemented security best practices but one...

Security Resources File
Oracle Critical Patch Update April 2011 Pre-Release Analysis

Here is a brief analysis of the pre-release announcement for the...

COLLABORATE11 - IOUG Operation Classified: Security Hackfest

For those of you not familiar with COLLABORATE or have not previously attended, the Oracle Applications Users Group (OAUG) and Independent Oracle...

Real World Database Auditing

IOUG 2009 COLLABORATE Presentation - Database auditing is one of the most misunderstood and neglected database features, however, database...

Security Resources File
Spoofing Oracle Session Information

Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,...

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File
An Introduction to SQL Injection Attacks for Oracle Developers

Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database....

Security Resources File
Evading Network-Based Oracle Database Intrusion Detection Systems

With the advent of legislative mandates like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA), the...

Security Resources File
Integrigy Oracle Listener Security Check Tool Updated (version 2.2)

We have updated our free Oracle Database Listener Security...

Oracle Security Blog
Integrigy Oracle Listener Security Check Tool Updated

We have updated our free Oracle Database Listener Security Check tool that analyzes...

Oracle Security Blog

Pages