Whilst Cloud-based IAM services such as Oracle Identity Cloud Service are clearly the strategic direction for many customers, I still work with lots of...
Whilst Cloud-based IAM services such as Oracle Identity Cloud Service are clearly the strategic direction for many customers, I still work with lots of companies either using today, or still considering traditional ‘on-premise’ IAM solutions. This can be for a variety of reasons, including: They cannot move to the cloud due to the sensitivity of their organisation, or possibly for regulatory reasons. They need deep technical capabilities and flexibility of an on-premise IAM...
Whilst Cloud-based IAM services such as Oracle Identity Cloud Service are clearly the strategic direction for many customers, I still work with lots of companies either using today, or...
If you’re stymied about how to protect your on premises data now, then leverage that security layer in your move to the cloud, read on. With about 2 Billion...
If you’re stymied about how to protect your on premises data now, then leverage that security layer in your move to the cloud, read on. With about 2 Billion pieces of malware circulating and 1M new ones created each day, any user, asset, or application is at risk of being attacked. But databases containing sensitive information pose a significantly higher risk. This holds true for companies with on premises datacenters and self-sourced IT groups as well as those using...
If you’re stymied about how to protect your on premises data now, then leverage that security layer in your move to the cloud, read on. With about 2 Billion pieces of malware circulating and 1M...
As OpenWorld begins to wind down, we hope you've enjoyed the sessions, events, and announcements this year. CloudFest. 18 was a great time! With such a busy...
As OpenWorld begins to wind down, we hope you've enjoyed the sessions, events, and announcements this year. CloudFest. 18 was a great time! With such a busy week, it is time for us to grab a cup of coffee! Although the official conference is coming to an end, it is just the beginning of new innovations for Oracle Security. Stay tuned for more thought leadership blogs, announcement recaps, and deep dive information on our Oracle Security solutions throughout the year. Here...
As OpenWorld begins to wind down, we hope you've enjoyed the sessions, events, and announcements this year. CloudFest. 18 was a great time! With such a busy week, it is time for us to grab a cup of...
By: Nishi Shah, Director Cyber Security & Privacy, PwC As I discussed in my last blog, “Security Operations: Using Artificial Intelligence to Lock Down Your...
By: Nishi Shah, Director Cyber Security & Privacy, PwC As I discussed in my last blog, “Security Operations: Using Artificial Intelligence to Lock Down Your Cloud,” I talked about how technology security teams can improve efficiency and incident resolution in cloud solutions with Oracle Management Cloud’s (OMC) automated artificial intelligence (AI) and machine learning capabilities. But, let’s turn our attention to the bigger picture for a moment: Technology security has...
By: Nishi Shah, Director Cyber Security & Privacy, PwC As I discussed in my last blog, “Security Operations: Using Artificial Intelligence to Lock Down Your Cloud,” I talked about how technology...
Oracle’s Cloud at Customer portfolio offers the premium security of Oracle Cloud, like continuous patching and threat monitoring, and offers you the ability to...
Oracle’s Cloud at Customer portfolio offers the premium security of Oracle Cloud, like continuous patching and threat monitoring, and offers you the ability to control the security within your own data center.
Oracle’s Cloud at Customer portfolio offers the premium security of Oracle Cloud, like continuous patching and threat monitoring, and offers you the ability to control the security within your own...
By Nishi Shah, Director Cyber Security & Privacy, PwC and Soumya Banerjee, Director Cyber Security & Privacy, PwC A mid-sized company with about 5,000 employees...
By Nishi Shah, Director Cyber Security & Privacy, PwC and Soumya Banerjee, Director Cyber Security & Privacy, PwC A mid-sized company with about 5,000 employees gets approximately 1,000 to 2,000 security incidents per day. This equates to nearly 60,000 threat incidents per month and as many as 720,000 per year. That number has increased dramatically because of automated security attacks using bots. According to The Cybersecurity Intelligence Report from Oracle + Dyn “over...
By Nishi Shah, Director Cyber Security & Privacy, PwC and Soumya Banerjee, Director Cyber Security & Privacy, PwC A mid-sized company with about 5,000 employees gets approximately 1,000 to 2,000...
We’re all guilty of thinking myopically at times. It’s easy to get caught up thinking about the objects in our foreground and to lose our sense of depth. We...
We’re all guilty of thinking myopically at times. It’s easy to get caught up thinking about the objects in our foreground and to lose our sense of depth. We forget about the environment and the context and we focus too narrowly on some singular subject. It’s not always a bad thing. Often, we need to focus very specifically to take on challenges that would otherwise be too big to address. For example, security professionals spend a lot of time thinking about specific attack...
We’re all guilty of thinking myopically at times. It’s easy to get caught up thinking about the objects in our foreground and to lose our sense of depth. We forget about the environment and the...
Monitor and Secure Your Systems You have made the business decision to outsource database administration, including some or all of your IT organization. Yes,...
Monitor and Secure Your Systems You have made the business decision to outsource database administration, including some or all of your IT organization. Yes, you can save money, but it comes with a lot of headaches and frustration when you can’t get tasks turned around fast enough. Contract vendors have strong SLAs for what they will and will not do. This makes troubleshooting systems that span different domains very difficult. The DBA always says the database is fine. The...
Monitor and Secure Your Systems You have made the business decision to outsource database administration, including some or all of your IT organization. Yes, you can save money, but it comes with...
Did you know Oracle has one of the biggest security practices in the United States? When you think about breach remediation, your first thoughts may be FireEye...
Did you know Oracle has one of the biggest security practices in the United States? When you think about breach remediation, your first thoughts may be FireEye or PwC, but the reality is, once you get past the network tier, Oracle takes over because our technologies are usually in place in the Web, Application and the database tiers. In the end, hackers are after data in databases. Many times, hackers are not even attacking your systems; they are hacking your people. Do...
Did you know Oracle has one of the biggest security practices in the United States? When you think about breach remediation, your first thoughts may be FireEye or PwC, but the reality is, once you...