System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
17 Aug 2014
open to premium members only
Oracle Introduces Key Vault Software Appliance to Manage and Safeguard Encryption Keys [37796]
From Database Trends and Applications Magazine

"While encryption is widely recognized as the gold standard for protecting data privacy, the technology is only as strong as its key management, according to Oracle, and critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms.

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. This time, the reported data breach involves a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses..."
(Get More Information . .)

08 Aug 2014
open to premium members only
Focus on Database Security at Oracle OpenWorld, 2014 [37697]
By Troy Kitch

Troy writes, "Data security threats and regulatory compliance are the new "death" and "taxes" that we can all be certain of. Security is a hot topic across all organizations, whether you have 100 or 100,000 employees. Organizations are scrambling to mitigate threats and comply with regulatory requirements. Oracle OpenWorld is the place for customers to hear about the latest advances in data security, meet with security experts, and learn the next steps to help secure the sensitive data they hold.

With Oracle OpenWorld, 2014 about 2 months away, we've compiled the database security sessions, hands on labs, and more, that are critical for database administrators, security experts and executives to attend. As an example of just some of the talks this year:..."
(Get More Information . .)

01 Aug 2014
open to premium members only
Solaris 11.2 released with security and other enhancements [37586]
By Gerry Haskins

Gerry writes, "There's a huge amount of new and improved features in Solaris 11.2 as well as thousands of bug fixes. In short, it's our best Solaris ever!

For security conscious customers, Solaris 11.2 delivers significant compliance enhancements (see the docs) and provides the new 'solaris-minimal-server' Install group, which is an excellent basis for installing secure, minimized (hardened) systems.

Hardening (minimizing) a system in Solaris 10 and earlier was as much an art form as a science. It was hard to be sure that the system was as minimized as possible..."
(Get More Information . .)

31 Jul 2014
open to premium members only
Oracle Identity Management Achieves Significant Customer and Partner Adoption [37588]
Complete and integrated, next-generation identity management suite helps customers and partners efficiently secure the extended enterpris

"As organizations build a strategy for digital transformation, they are seeking a unified approach to enterprisewide identity management that provides consistent access controls and an optimized user experience across the extended enterprise. To help organizations offer more digital services, Oracle Identity Management provides the foundation to connect to the internet value chain and economies of scale to manage users across all channels of interaction including cloud, mobile, and social.

The Oracle stack allows companies to homogenize and defragment identity information and services, which can result in faster deployment times, faster upgrades, and lower cost of ownership. Today, many companies are already reaping economic benefits with the simplified user experience and greater end user participation..."
(Get More Information . .)

28 Jul 2014
open to premium members only
Oracle on cyber security aspects of BYOD [37587]
By Steve Walker

Steve writes, "Bring your own device (BYOD) has been an unstoppable force on the crest of the consumerisation wave, and one that companies have simply had to roll with.

But it is increasingly being rebranded as 'bring your own disaster' with IT departments desperately grappling for solutions that will allow them to take back some degree of control over the mobile environment, hastily assembling a raft of MDM (mobile device management) tools.

It has become obvious that the utopian ideal of BYOD is more myth than a practical reality for most firms. So has the BYOD wave broken?..."
(Get More Information . .)

23 Jul 2014
open to premium members only
Identity Management in the Cloud [37491]
Leverage New Whitepaper to Learn About this Important Topic

IT security and access management have never been greater challenges. These new challenges can't be solved with yesterday's user access models. To mitigate risk and control costs, comprehensive Identity Management solutions, designed for today's diverse computing environments and mobile workforce, are taking center stage.

With so much at risk, it's no wonder that this new, hot topic is occupying a top position on every CIO's security agenda. Gail Coury, VP Risk Management, Oracle Managed Cloud Services has written a whitepaper entitled 'A High-Level Guide to Effective Identity Management in the Cloud.'

This paper helps CIOs explore the options so that they can better formulate the right Identity Management strategy for their company today and in the future.
(Get More Information . .)

 
back5 6 7 8 9 10 11 12 13 14 15 next