OCI Load Balancer by default supports TLS 1.2. In some situations, this version is not enough. It’s important to understand that the SSL Ciphers that are...
OCI Load Balancer by default supports TLS 1.2. In some situations, this version is not enough. It’s important to understand that the SSL Ciphers that are enabled really depend on the type of application and the business requirements of the application. Some organizations want to widen their TLS versions and allow different versions based on the requirements. Some applications require more control over which TLS versions and ciphers are used for their HTTPS or TLS connections...
OCI Load Balancer by default supports TLS 1.2. In some situations, this version is not enough. It’s important to understand that the SSL Ciphers that are enabled really depend on the type...
Moving WebLogic environments to Oracle Cloud Infrastructure is commonly done. But is the same true for the WebSphere middleware, especially the WAS 7/Java 6?...
Moving WebLogic environments to Oracle Cloud Infrastructure is commonly done. But is the same true for the WebSphere middleware, especially the WAS 7/Java 6? The short answer is YES! In this blog posting, we describe an approach for running your legacy and current WebSphere environments in OCI.
Moving WebLogic environments to Oracle Cloud Infrastructure is commonly done. But is the same true for the WebSphere middleware, especially the WAS 7/Java 6? The short answer is YES! In this blog...
One of the primary value propositions for cloud is that it makes life easier by transferring some of the cost and complexity to the cloud vendor. But that...
One of the primary value propositions for cloud is that it makes life easier by transferring some of the cost and complexity to the cloud vendor. But that doesn’t always hold up for security professionals. In a new research paper, Dao Research compares the cloud security capabilities offered by Amazon AWS, Google Cloud Platform, Microsoft Azure, and Oracle Cloud Infrastructure (OCI).
One of the primary value propositions for cloud is that it makes life easier by transferring some of the cost and complexity to the cloud vendor. But that doesn’t always hold up for...
So, you’ve just signed up to a shiny new cloud provider. It’s exciting when you realise that you not only have an almost unlimited supply of IaaS at your...
So, you’ve just signed up to a shiny new cloud provider. It’s exciting when you realise that you not only have an almost unlimited supply of IaaS at your fingertips, however, before you get carried away spinning up compute and uploading your files into storage, you need to realise that you have a shared responsibility for security. In this blog, we will examine some use cases that we need to address with CSPM and then we’ll discuss how Oracle can help you to meet your...
So, you’ve just signed up to a shiny new cloud provider. It’s exciting when you realise that you not only have an almost unlimited supply of IaaS at your fingertips, however, before you get carried...
0Chain – deployable directly from Oracle Cloud Marketplace – provides automation, liability and breach protection, immutability, transparency, and a trusted...
0Chain – deployable directly from Oracle Cloud Marketplace – provides automation, liability and breach protection, immutability, transparency, and a trusted platform for the Oracle Cloud Infrastructure customers to not only abide by GDPR/CCPA regulations, but also use them to their business advantage.
0Chain – deployable directly from Oracle Cloud Marketplace – provides automation, liability and breach protection, immutability, transparency, and a trusted platform for the Oracle...
Like many industries today, the education vertical has largely embraced “bring-your-own-device” (BYOD) programs for the myriad benefits they provide, including...
Like many industries today, the education vertical has largely embraced “bring-your-own-device” (BYOD) programs for the myriad benefits they provide, including increased productivity and general satisfaction among staff, and significant cost savings through decreased spend on new equipment. However, the implementation of BYOD also means a network that contains many untrusted and potentially infected devices at any time, each generating traffic that requires granular...
Like many industries today, the education vertical has largely embraced “bring-your-own-device” (BYOD) programs for the myriad benefits they provide, including increased productivity and...
This blog faces the common customer question of expected latency and difficulty to setup a multi-regional connection. The content provides measurements to set...
This blog faces the common customer question of expected latency and difficulty to setup a multi-regional connection. The content provides measurements to set an expectation for performance in multi-regional architectures.
This blog faces the common customer question of expected latency and difficulty to setup a multi-regional connection. The content provides measurements to set an expectation for performance...
FedRAMP has paved the pathway for federal adoption of cloud computing as a cornerstone of federal security. Still, there needs to be a systematic shift to...
FedRAMP has paved the pathway for federal adoption of cloud computing as a cornerstone of federal security. Still, there needs to be a systematic shift to enable scale for it to build on its success. CSPs share their experience and insights on ways to accelerate, reduce constraints, and even evolve the accreditation process.
FedRAMP has paved the pathway for federal adoption of cloud computing as a cornerstone of federal security. Still, there needs to be a systematic shift to enable scale for it to build on its success....
Given today’s growing threat environment, state and local government agencies must strengthen infrastructure as well as secure the perimeter. Doing so...
Given today’s growing threat environment, state and local government agencies must strengthen infrastructure as well as secure the perimeter. Doing so effectively means using the benefits of next-generation cloud, including the automation it offers to improve security, reliability, and operational efficiency.
Given today’s growing threat environment, state and local government agencies must strengthen infrastructure as well as secure the perimeter. Doing so effectively means using the benefits of...