Title | Summary | File | |
---|---|---|---|
Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite |
Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application... |
Security Resources | File |
Eight Key Components of a Database Security Risk Assessment |
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the... |
Security Resources | File |
PeopleSoft and ElasticSearch Security Examined |
ElasticSearch and Kibana will continue to be an integral part of PeopleSoft applications in the future. With the introduction of any new... |
Whitepapers and Presentations | File |
The Thrifty DBAs Guide to Open Source Database Security Tools |
To properly secure an Oracle database requires significant effort and often expensive security add-on products. The Thrifty DBA likes having... |
Security Resources | File |
The Tools Hackers Are Using Against Your Oracle Database |
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable... |
Security Resources | File |
Effective Oracle E Business Suite Change Management from DBA to Auditor |
For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible. Changes may... |
Whitepapers and Presentations | File |
Security Considerations When Running Oracle E Business Suite in the Cloud |
How does Oracle E-Business Suite security change when you move to the Cloud? Running Oracle E-Business Suite at Oracle Cloud Infrastructure or... |
Whitepapers and Presentations | File |
Change Your Thinking About Security with Oracle Database in the Cloud |
How does database security change when you move to the Cloud? Security does change and how to handle database security needs to change when... |
Security Resources | File |
Is Your Sensitive Data Playing Hide and Seek with You? |
Your Oracle databases and ERP applications may contain sensitive personal data like Social Security numbers, credit card numbers, addresses, date... |
Whitepapers and Presentations | File |
Upcoming Webinar: Is Your Sensitive Data Playing Hide and Seek with You? | Oracle Security Blog |