System News
back1 2 3 4 5 6 7 8 9 10 11 next
Archived Security Articles
31 Jul 2014
open to premium members only
Oracle Identity Management Achieves Significant Customer and Partner Adoption [37588]
Complete and integrated, next-generation identity management suite helps customers and partners efficiently secure the extended enterpris

"As organizations build a strategy for digital transformation, they are seeking a unified approach to enterprisewide identity management that provides consistent access controls and an optimized user experience across the extended enterprise. To help organizations offer more digital services, Oracle Identity Management provides the foundation to connect to the internet value chain and economies of scale to manage users across all channels of interaction including cloud, mobile, and social.

The Oracle stack allows companies to homogenize and defragment identity information and services, which can result in faster deployment times, faster upgrades, and lower cost of ownership. Today, many companies are already reaping economic benefits with the simplified user experience and greater end user participation..."
(Get More Information . .)

28 Jul 2014
open to premium members only
Oracle on cyber security aspects of BYOD [37587]
By Steve Walker

Steve writes, "Bring your own device (BYOD) has been an unstoppable force on the crest of the consumerisation wave, and one that companies have simply had to roll with.

But it is increasingly being rebranded as 'bring your own disaster' with IT departments desperately grappling for solutions that will allow them to take back some degree of control over the mobile environment, hastily assembling a raft of MDM (mobile device management) tools.

It has become obvious that the utopian ideal of BYOD is more myth than a practical reality for most firms. So has the BYOD wave broken?..."
(Get More Information . .)

23 Jul 2014
open to premium members only
Identity Management in the Cloud [37491]
Leverage New Whitepaper to Learn About this Important Topic

IT security and access management have never been greater challenges. These new challenges can't be solved with yesterday's user access models. To mitigate risk and control costs, comprehensive Identity Management solutions, designed for today's diverse computing environments and mobile workforce, are taking center stage.

With so much at risk, it's no wonder that this new, hot topic is occupying a top position on every CIO's security agenda. Gail Coury, VP Risk Management, Oracle Managed Cloud Services has written a whitepaper entitled 'A High-Level Guide to Effective Identity Management in the Cloud.'

This paper helps CIOs explore the options so that they can better formulate the right Identity Management strategy for their company today and in the future.
(Get More Information . .)

04 Jul 2014
open to premium members only
DefenseCode: Unix WildCards Gone Wild [37205]
By Leon Juranic

"First of all, this article has nothing to do with modern hacking techniques like ASLR bypass, ROP exploits, 0day remote kernel exploits or Chrome's Chain-14-Different-Bugs-To-Get-There...

Nope, nothing of the above. This article will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2013. Hacking technique of which (to my suprise) even many security-related people haven't heard of.

That is probably because nobody ever really talked about it before. Why I decided to write on this subject is because, to me personally, it's pretty funny to see what can be done with simple Unix wildcard poisoning tricks. So, from this article, what you can expect is collection of neat *nix hacking tricks that as far as I know somehow didn't emerge earlier. .."
(Get More Information . .)

23 Jun 2014
open to premium members only
Java Cloud Service: Security [37093]
By Jani Rautiainen

Jani writes, "Java Cloud Service (JCS) provides a platform to develop and deploy business applications in the cloud. In Fusion Applications Cloud deployments customers do not have the option to deploy custom applications developed with JDeveloper to ensure the integrity and supportability of the hosted application service. Instead the custom applications can be deployed to the JCS and integrated to the Fusion Application Cloud instance.

This series of articles will go through the features of JCS, provide end-to-end examples on how to develop and deploy applications on JCS and how to integrate them with the Fusion Applications instance..."
(Get More Information . .)

16 Jun 2014
open to premium members only
It's Time for Businesses to get Serious about BYOD [36990]
Klaus Bergius, Director of Technology Marketing EMEA at Oracle

Greg Jensen writes, "Bring Your Own Device (BYOD) is a corporate reality that is already affecting virtually every business operating today. In some ways BYOD is inevitable, with businesses having little choice but to adapt to it. Consumer smartphones, tablets and laptops may eventually end the corporate mandating of employee devices. But currently, there is widespread concern and even denial in enterprises, while embracing BYOD could create new opportunities. This is what the Oracle European BYOD Index Report, based on research carried out in January and February 2014, reveals..."
(Get More Information . .)

 
back1 2 3 4 5 6 7 8 9 10 11 next









News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998