Category Archives: Security
OTN Two Minute Tech Tip – SYS_CONTEXT to help secure your database
My Two minute tech tip with OTN on using sys_context to help you secure your database. We can use the values returned from sys_context along with Virtual Private Databases, Fine Grained Auditing, and Redaction to lock down the sensitive data.
#infosec #encrypt backups with #rman
Why should you encrypt your backups? Why should you test your backups? I will be speaking on Holistic Database Security at #kscope15 and #harmony15
#infosec #Oracle data #redaction
I had a rather disturbing conversion with my wife a couple nights ago, she had called a service provider to discuss a bill. The customer service rep asked her for her social security number to verify her identity. When my … Continue reading
#Infosec
I recently have been receiving emails for consulting work. This is a good thing because I’m back on the market. However; some of the emails I have been receiving are asking for PII. This information can be used for identity … Continue reading
Encrypt those backups
April 2005 Ameratrade loses a backup tape containing information on 200,000 customers. February 2005 Bank of America loses backup tapes containing information on 1.2 million charge cards. September 2011, SAIC loses backup tapes of 4.9 Million members of the military … Continue reading
Encrypt those backups
April 2005 Ameratrade loses a backup tape containing information on 200,000 customers. February 2005 Bank of America loses backup tapes containing information on 1.2 million charge cards. September 2011, SAIC loses backup tapes of 4.9 Million members of the military … Continue reading
Security in the Cloud. Install #1
There are a number of different vendors providing cloud services. You can buy space and processing power from vendors like IBM, or Amazon or many other service providers. In the interest of full disclosure, I use cloud services all the … Continue reading
Social engineering does happen.
There have been a few times where social engineering was attempted with one of my customers. Sometimes I wind up taking the phone call after someone calls the help desk looking for some information we would not normally give out. … Continue reading
PII is valuable to criminals
The theft of PII is no longer relegated to petty criminals and hackers; it is now organized crime rings that are targeting PII and selling it on the back market. Some nations even tolerate criminal hacking to steel PII as … Continue reading
If you don’t measure it, you can’t protect it
have always felt safe in my home until a few days ago I had locked myself out of my house. I spent about 30 minutes looking for a spare house key my wife may have left in a car that … Continue reading