Title Summary File
Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite

Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application...

Security Resources File
Eight Key Components of a Database Security Risk Assessment

To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the...

Security Resources File
PeopleSoft and ElasticSearch Security Examined

ElasticSearch and Kibana will continue to be an integral part of PeopleSoft applications in the future. With the introduction of any new...

Whitepapers and Presentations File
The Thrifty DBAs Guide to Open Source Database Security Tools

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having...

Security Resources File
The Tools Hackers Are Using Against Your Oracle Database

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable...

Security Resources File
Effective Oracle E Business Suite Change Management from DBA to Auditor

For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible.  Changes may...

Whitepapers and Presentations File
Security Considerations When Running Oracle E Business Suite in the Cloud

How does Oracle E-Business Suite security change when you move to the Cloud? Running Oracle E-Business Suite at Oracle Cloud Infrastructure or...

Whitepapers and Presentations File
Change Your Thinking About Security with Oracle Database in the Cloud

How does database security change when you move to the Cloud? Security does change and how to handle database security needs to change when...

Security Resources File
Is Your Sensitive Data Playing Hide and Seek with You?

Your Oracle databases and ERP applications may contain sensitive personal data like Social Security numbers, credit card numbers, addresses, date...

Whitepapers and Presentations File
Upcoming Webinar: Is Your Sensitive Data Playing Hide and Seek with You?

Is Your Sensitive Data Playing Hide and Seek with You?
...

Oracle Security Blog

Pages