System News
back2 3 4 5 6 7 8 9 10 11 12 next
Archived Security Articles
16 Mar 2015
open to premium members only
Three Big Data Threat Vectors [41428]
The Biggest Breaches are Yet to Come

Troy Kitch writes, "Where a few years ago we saw 1 million to 10 million records breached in a single incident, today we are in the age of mega-breaches, where 100 and 200 million records breached is not uncommon.

According to the Independent Oracle Users Group Enterprise Data Security Survey, 34% of respondents say that a data breach at their organization is "inevitable" or "somewhat likely" in 2015.

Combine this with the fact that the 2014 Verizon Data Breach Investigations Report tallied more than 63,000 security incidents - including 1,367 confirmed data breaches. That's a lot of data breaches..."
(Get More Information . .)

11 Mar 2015
open to premium members only
Oracle Directory Server Enterprise Edition (DSEE) to Oracle Unified Directory (OUD) [41313]
Upgrade and Co-existence

Greg Jensen writes, "As a follow up on 'Why Customers Should Upgrade Directory Server Enterprise Edition (DSEE) to Oracle Unified Directory (OUD)?', I would like to illustrate in a case study how easily upgrade can be achieved.

An upgrade process can be defined as the steps required for moving from a state where application leverage data managed within a DSEE directory service to a state where applications leverage data managed within an OUD directory service.

There are multiple ways to achieve that goal:..."
(Get More Information . .)

04 Mar 2015
open to premium members only
Securing Information in the New Digital Economy [41197]
Joint Oracle and Verizon Report

To learn more about Securing Information in the New Digital Economy, read the joint Oracle and Verizon Report.

We are in the midst of a data breach epidemic, fueled by a lucrative information black market. The perimeter security most IT organizations rely on has become largely ineffective. Nearly 70% of security resources are focused on perimeter controls, but most exploited vulnerabilities are internal.

Effective modern security requires an inside-out approach with a focus on data and internal controls...
(Get More Information . .)

01 Mar 2015
open to premium members only
Establishing a Mobile Security Architecture [41196]
Beyond Brute Force: 3 User-Friendly Strategies for BYOD Security

Organizations of today are at a point of transition from using personal or company-issued devices with restrictive controls to using these devices to meet the personal needs of the end user. One thing most security experts agree on is the high-risk posture that comes with the adoption of mobility. This risk is present because of the practice of extending the corporate perimeter onto the mobile device. To expect that a consumer-grade $300 smartphone can replace the security layers of the enterprise (firewalls, intrusion prevention, anti-malware, access control frameworks, multifactor authentication, and more) is just not a reasonable expectation without a focused look at how enterprises should extend their enterprise security framework to the mobile platform...

The Oracle mobile strategy is all about providing a secure and available mobile experience from any device, from anywhere, and at any time. From mobile clients to back-end enterprise systems, Oracle's mobile platform offers the reliability, scalability, availability, and portability that enterprises expect in a modern, enterprise-grade platform. With the unique capabilities of this platform, mobile devices, services, and applications can be rapidly and securely developed, creating an ever-expanding list of possibilities...
(Get More Information . .)

27 Feb 2015
open to premium members only
Establishing a Mobile Security Architecture [41058]
New eBook

Greg Jensen writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave of mobility as a new generation of devices and applications are coming online to take advantage of these new capabilities in today's corporate environments.

'Establishing a Mobile Security Architecture' provides a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment..."
(Get More Information . .)

24 Feb 2015
open to premium members only
Standards Corner: A 'Robust' Schema Approach for SCIM [41057]
System for Cross-domain Identity Management

Phil Hunt writes, "Last week, I had a question about SCIM's (System for Cross-domain Identity Management) and its approach to schema. How does the working group recommend handling message validation? Doesn't SCIM have a formal schema?

To be able to answer that question, I realized that the question was about a different style of schema than SCIM supports. The question was assuming that 'schema' is defined how XML defines schema as a way to validate documents..."
(Get More Information . .)

back2 3 4 5 6 7 8 9 10 11 12 next