Title Summary File
Eight Key Components of a Database Security Risk Assessment

To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the...

Security Resources File
Fine Grained Auditing (FGA) and Protecting Oracle E-Business PII Data for Executives

With the recent news about yet another database breach of Personally Identifiable Information (PII), Integrigy had a discussion with a client...

Oracle Security Blog
Trusting Privileged Users, DBMS_SQLHASH, and Three Misconceptions about Encryption

Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and...

Oracle Security Blog
How To Stop Insiders from Stealing Your Secrets – Recommendations on Rings of Security

For those of you who attended our webinar on 15-May-2014 on how to secure privileged users,...

Oracle Security Blog
Risk of Information Leakage from the Oracle E-Business Suite – Attached Files

Attached files are an information leakage risk for the Oracle E-Business Suite. There are two sources, and the second is not commonly recognized...

Oracle Security Blog
Protecting Sensitive Data in Oracle E-Business Suite

To protect sensitive data, like Social Security numbers, in Oracle E-Business Suite environments, numerous Oracle technologies and third-party...

Security Resources File
Oracle E-Business Suite: Credit Cards and PCI Compliance

All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (...

Security Resources File
Credit Cards and Oracle: How to Comply with PCI-DSS

IOUG COLLABORATE 2011 - Credit card data breaches are headline news thus organizations must properly protect credit card data or risk being...

Security Resources File