Skip to main content


Contact UsSupportRequest a Demo
Home
Toggle menu

  • Solutions
  • Products & Services
    • AppDefend
    • AppSentry
    • Consulting
  • Security Resources
  • Company
    • About Us
    • Clients
    • Partners
    • Careers
    • Contact Us
  • Blog

Webinar



WebLogic Vulnerabilities - Oracle E-Business Suite Impact (CVE-2020-14882 and CVE-2020-14750)

  • Read more about WebLogic Vulnerabilities - Oracle E-Business Suite Impact (CVE-2020-14882 and CVE-2020-14750)
As part of the Oracle October 2020 Critical Patch Update (CPU), two critical vulnerabilities were fixed in the Oracle WebLogic web application server (CVE-2020-14882/CVE-2020-14883) that allow an unauthenticated attacker to compromise the server....

Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite

  • Read more about Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite
Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application are who they say they are. Using 2FA with Oracle E-Business Suite (EBS) can provide security as well as...

Eight Key Components of a Database Security Risk Assessment

  • Read more about Eight Key Components of a Database Security Risk Assessment
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the processes, operations, resources, and technology to identify security risks, issues, and weaknesses....

PeopleSoft and ElasticSearch Security Examined

  • Read more about PeopleSoft and ElasticSearch Security Examined
ElasticSearch and Kibana will continue to be an integral part of PeopleSoft applications in the future. With the introduction of any new technology, security risks must always be considered and the technology must be understood. This educational...

The Thrifty DBAs Guide to Open Source Database Security Tools

  • Read more about The Thrifty DBAs Guide to Open Source Database Security Tools
To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero...

The Tools Hackers Are Using Against Your Oracle Database

  • Read more about The Tools Hackers Are Using Against Your Oracle Database
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they...

Effective Oracle E Business Suite Change Management from DBA to Auditor

  • Read more about Effective Oracle E Business Suite Change Management from DBA to Auditor
For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible.  Changes may be made at many different layers and to a large of number of types of objects and components.  ...

Security Considerations When Running Oracle E Business Suite in the Cloud

  • Read more about Security Considerations When Running Oracle E Business Suite in the Cloud
How does Oracle E-Business Suite security change when you move to the Cloud? Running Oracle E-Business Suite at Oracle Cloud Infrastructure or Amazon Web Services provides both security advantages and disadvantages. However, you still own your data...

Change Your Thinking About Security with Oracle Database in the Cloud

  • Read more about Change Your Thinking About Security with Oracle Database in the Cloud
How does database security change when you move to the Cloud? Security does change and how to handle database security needs to change when running databases in the Cloud. However, you still own your data and are still responsible for making sure...

Is Your Sensitive Data Playing Hide and Seek with You?

  • Read more about Is Your Sensitive Data Playing Hide and Seek with You?
Your Oracle databases and ERP applications may contain sensitive personal data like Social Security numbers, credit card numbers, addresses, date of births, and salary information. Understanding in what tables and columns sensitive data resides is...

Pagination

  • Previous page ‹‹
  • Next page ››
Subscribe to Webinar


Products & Services
  • AppDefend
  • AppSentry
  • Integrigy Consulting

 
Security Resources
  • Featured
  • Recent Updates
  • Blog
 
About Integrigy
Sales Inquiries

sales@integrigy.com


General Questions

info@integrigy.com


  • twitter
  • linkedin
  • youtube
Subscribe to the Integrigy's Newsletter

Receive the latest updates from the Integrigy Research Team regarding Oracle E-Business Suite, PeopleSoft, and database security vulnerabilities, new whitepapers, and educational webinars.

Get INTEGRIGY News



Copyright © 2025 Integrigy Corporation. All rights reserved.

Privacy Information  |  Legal Information

sfy39587stp18