Title | Summary | File | |
---|---|---|---|
Eight Key Components of a Database Security Risk Assessment |
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the... |
Security Resources | File |
Fine Grained Auditing (FGA) and Protecting Oracle E-Business PII Data for Executives |
With the recent news about yet another database breach of Personally Identifiable Information (PII), Integrigy had a discussion with a client... |
Oracle Security Blog | |
Trusting Privileged Users, DBMS_SQLHASH, and Three Misconceptions about Encryption |
Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and... |
Oracle Security Blog | |
How To Stop Insiders from Stealing Your Secrets – Recommendations on Rings of Security |
For those of you who attended our webinar on 15-May-2014 on how to secure privileged users,... |
Oracle Security Blog | |
Risk of Information Leakage from the Oracle E-Business Suite – Attached Files |
Attached files are an information leakage risk for the Oracle E-Business Suite. There are two sources, and the second is not commonly recognized... |
Oracle Security Blog | |
Protecting Sensitive Data in Oracle E-Business Suite |
To protect sensitive data, like Social Security numbers, in Oracle E-Business Suite environments, numerous Oracle technologies and third-party... |
Security Resources | File |
Oracle E-Business Suite: Credit Cards and PCI Compliance |
All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (... |
Security Resources | File |
Credit Cards and Oracle: How to Comply with PCI-DSS |
IOUG COLLABORATE 2011 - Credit card data breaches are headline news thus organizations must properly protect credit card data or risk being... |
Security Resources | File |