Happy Data Privacy Day! For those of you scratching your heads right now, we are here to explain further. In a world of online subscriptions, website browsing, and businesses selling and otherwise leveraging customer information, many people are uninformed or plain confused about what is really happening with their data. Data Privacy Day is all about raising awareness of how data is being used and promoting action to better protect all personal data, both our own data and...
Bring your own key (BYOK for short) seems to be the buzzword of the year; however, I struggle to understand where this comes from ... If prospective cloud customers want to retain control over their encryption keys, they can deploy an Oracle Key Vault 18 cluster on-prem to manage the encryption keys of on-prem and cloud-based Oracle databases at the same time. On the other hand, I have heard customers call those "BYOK" keys "pre-breached" keys, since they have been...
To unlock the real value of data, businesses need to use it and “interact” with it in some way. Unlocking your data can create operational risk such as someone leaving the door open, abusing data access privileges, or not knowing where and what kind of data is being accessed. To help customers protect data and reduce this operational risk, Oracle recently introduced Oracle Data Safe, read here to learn more.
The Database Security Development and Product Management teams are happy to announce Oracle Key Vault 12.2, bundle patch 10. This new release update brings increased efficiency and improved security to your organization.
Data Safe helps organizations identify sensitive data and mask it for use in partner or development environments. It also alerts on risky users and unsafe system configurations; and monitors database activity to let organizations quickly discover suspicious attempts to access their data.
Welcome to the final article in my series, where we have been discussing “Enhancing EBS Security on OCI”. We have covered a lot of ground in this series, looking at a range of threats that need addressing for your EBS (or any enterprise) application being moved to the Cloud. In this article, we will be looking at the final threat on my list, Database Bypass.
In the area of security, we continue our innovations to improve the self-securing capabilities. Many customers have already been excited about self-patching capabilities, freeing up their DBAs to focus on more strategic projects. Tune in to our newest On-demand webcast around Autonomous Database and Data Safe.