System News
back1 2 3 4 5 6 7 8 9 10 11 next
Archived Security Articles
27 Feb 2015
open to premium members only
Establishing a Mobile Security Architecture [41058]
New eBook

Greg Jensen writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave of mobility as a new generation of devices and applications are coming online to take advantage of these new capabilities in today's corporate environments.

'Establishing a Mobile Security Architecture' provides a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment..."
(Get More Information . .)

24 Feb 2015
open to premium members only
Standards Corner: A 'Robust' Schema Approach for SCIM [41057]
System for Cross-domain Identity Management

Phil Hunt writes, "Last week, I had a question about SCIM's (System for Cross-domain Identity Management) and its approach to schema. How does the working group recommend handling message validation? Doesn't SCIM have a formal schema?

To be able to answer that question, I realized that the question was about a different style of schema than SCIM supports. The question was assuming that 'schema' is defined how XML defines schema as a way to validate documents..."
(Get More Information . .)

23 Feb 2015
open to premium members only
Enabling Mobile Application Management with Secure Enterprise Single Sign On [41056]
Oracle Mobile Security Suite (OMSS) addresses BYOD challenges

Carlos Chang writes, "Oracle Mobile Security Suite (OMSS) addresses BYOD challenges by isolating corporate from personal data on consumers' personal mobile devices without needing to lockdown the entire device. Using a technique called containerization; the Oracle Mobile Security Suite creates a Secure Workspace (SWS) in which corporate applications,email and data are stored. Only authenticated users can access the secure workspace to run applications and access data and only applications provisioned or approved by corporate IT can be installed and executed from within this secure workspace. If the device is lost or stolen, corporate IT can remotely wipe the secure workspace without affecting any personal data..."
(Get More Information . .)

16 Feb 2015
open to premium members only
Security Configuration in LDAP Adapter [40937]
Oracle Adapter for LDAP is a JCA resource adapte

Anuj Kaushal writes, "In this post we'll discuss the various security options that are available as part of the LDAP Adapter configuration. Oracle Adapter for LDAP is a JCA resource adapter that provides bi-directional connectivity with LDAP v3 compliant directory servers*.

To be able to perform LDAP Operations, the adapter needs to establish a connection to communicate with a target LDAP directory server. For this, it is required to configure the resource adapter connection properties which will be used by the adapter to connect to the directory server..."
(Get More Information . .)

03 Feb 2015
open to premium members only
Data Encryption ... Software vs Hardware [40706]
What's Better and Why

John Szlendak asks, "Software vs Hardware Encryption, What's Better and Why..

People often ask me, when it comes to storage (or data-at-rest) encryption, what's better, File System Encryption (FSE) which is done in software by the storage controller, or Full Disk Encryption (FDE) which is done in hardware via specialized Self Encrypting Drives (SEDs).

Both methods are very effective in providing security protection against data breaches and theft, but differ in their granularity, flexibility and cost. A good example of this is to compare Oracle ZFS Storage Appliance that uses very granular File System Encryption versus NetApp storage that uses Self Encrypting Drives (SEDs)..."
(Get More Information . .)

27 Jan 2015
open to premium members only
Data Encryption ... Be Safe or Be Sorry [40578]
How to Prevent the Next Data Breach with Encryption (Part 1)

John Szlendak writes, "Another day, another costly data breach headline. This time, it was Sony Pictures as the victim of a devastating cyber attack. Newspapers report that North Korean hackers broke into Sony's computer systems stealing and exposing a trove of sensitive documents. The studio's reputation is in tatters as embarrassing revelations spill from tens of thousands of leaked emails, private documents and other company sensitive materials. Millions of dollars in lawsuits are expected from ex-employees over leaked Social Security number and other personal information.

Sony is not alone..."
(Get More Information . .)

back1 2 3 4 5 6 7 8 9 10 11 next

News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998