Author: Sid Mishra
The Application Programming (more...)
Read and monitor Oracle related blogs and news sources, all in one place.
Author: Ricardo Diaz
Vast majority of global cyber-espionage emanates from China, report finds -Washington Post April 2013.
The economic threat of cyber crime is serious, has and will impact our daily lives and unfortunately been a threat most businesses haven't (more...)
Last week Michael Neuenschwander, Senior Director at Oracle hosted a live conversation on Privacy on twitter. We were honored to have Dr. Ann Cavoukian, Ontario Commissioner for Information and Privacy join #PrivQA chat and contribute actively to the discussion.
The conversation centered around recent privacy news stories like the Indian (more...)
A quick reminder that tomorrow (Thursday, March 28) at 10 am PDT / 1 pm EDT, experts from Virgin Media, implementation partner aurionPro SENA and Oracle will discuss how Virgin Media successfully enabled secure wi-fi services in London Underground in time for the London Olympics 2012.
The March (more...)
As we look forward in 2013, we look at the key (more...)
Want to share your Identity Management implementation experience? Got some thoughts on deployment best practices, innovative use cases, the next BIG thing in Identity Management? Then don't hold back.
Oracle OpenWorld call for speaking proposals is now open. Take the stage at one of the biggest IT conferences of the year and take part in shaping the IT discussion of today and tomorrow. Through the year, we keep hearing about how Oracle Identity Management customers are looking to hear from their peers, the Oracle solution and technology experts. So, if you have experience with and expertise on Oracle Identity Management, (more...)
Thanks to everyone who participated in our last week’s twitter chat on Mobile Identity Management. Whether your organization has already embraced the mobile culture (offering applications on mobile, allowing seamless access to specific resources via mobile or enabling BYOD) or is exploring to do so, mobile security has become top of mind for most security and IT professionals. So, we thank the participants for taking some time to share their thoughts and perspective on this topic.
During #MobileIDM chat, the discussion ranged from how far mobile authentication will go and whether it can be adopted as sole factor in user (more...)