Title | Summary | File | |
---|---|---|---|
Oracle Discoverer Security Alert - High impact to SOX Compliance and Financial Reporting |
For those clients using Oracle Discoverer, especially those using Discoverer with the Oracle E-Business Suite for financial reporting, the October... |
Oracle Security Blog | |
Oracle E-Business Suite 11i - October 2016 is Last Critical Patch Update |
Starting with the April 2016 Critical Patch Update (CPU), Oracle E-Business Suite 11.5.10 CPU patches are only available for customers with... |
Oracle Security Blog | |
Oracle Database Critical Patch Update October 2016: 12.1.0.2 and 11.2.0.4 Only |
The list of Oracle Database versions supported for Critical Patch Updates (CPU) is getting shorter and shorter. Starting with the October... |
Oracle Security Blog | |
Oracle Database TNS Poisoning Attacks (CVE-2012-1675) |
... |
Whitepapers and Presentations | File |
PeopleSoft Data Mover Security |
The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of... |
Oracle Security Blog | |
PeopleSoft Process Scheduler Security |
When performing a PeopleSoft security audit Integrigy carefully reviews batch processing activity generated through the Process Scheduler. Of... |
Oracle Security Blog | |
PeopleSoft User Security |
When performing a PeopleSoft security audit, reconciling users should be one of the first tasks. This includes default accounts created through... |
Oracle Security Blog | |
PeopleSoft Jolt Security |
Jolt along with Tuxedo supports PeopleSoft web requests. Specifically, Jolt is the layer between the application server and the web server. It is... |
Oracle Security Blog | |
PeopleSoft Web Portal Security |
When performing a PeopleSoft security audit, Integrigy reviews in detail the PeopleSoft Web Portal security settings to ensure they are set per... |
Oracle Security Blog | |
PeopleSoft Encryption |
Protection of sensitive data while at-rest, in-motion or in-use all need to be addressed as part of a holistic security strategy. This includes... |
Oracle Security Blog |