Cloud security is a topic of concern among enterprise decision-makers, but as this storage structure adapts to the needs of corporations, the conversation is becoming more positive. For instance, rather than accusing cloud providers of allowing data breaches to occur, IT experts are beginning to question the distribution of responsibility. (more...)
As the cloud market advances, more companies are switching to cloud-based infrastructures to manage their corporate IT. Because of its scalable storage capabilities and its remote access features, cloud services provide decision-makers with increased mobility, enhanced customization and the ability to change their strategies more readily than with traditional architectures. (more...)
Although the growing maturity of the cloud has made it easier for businesses to leverage new digital solutions, some decision-makers are hesitant to make the transition because of the loss of direct control that comes with outsourcing data. Losing complete control over information can be difficult for IT managers who are (more...)
Role-based access control (RBAC) makes for easy management, protection and adoption of Cloud Control.
Essentially Cloud Control is used by administrators to manage and monitor targets in the infrastructure. There are however some interesting views that can benefit other roles (eg: developers, Business Analysts, managers). From a security perspective there (more...)
It appears that international credit bureau company Experian was inadvertently selling private information to online criminals posing as “private investigators”. These criminals then used Social Security numbers, birthdays and drivers license records to commit identify theft. Ironically, Experian is also selling protection against identity theft to private customers…
Do you know (more...)
- Entropy pool
- Monitoring entropy
- Using /dev/urandom
- JRE – java.security
- rngd daemon
- Additional information
In computing you often need random numbers. They are used for encrypting stuff but (more...)
Declarative definition can be as simple as heading to Shared (more...)
C:\> sqlplus arup/arup
SQL*Plus: Release 184.108.40.206.0 Production on Mon Aug 19 14:17:45 (more...)
2 days ago I gave a presentation “Oracle 12c from the attackers perspective” at the DOAG SIG Security. I learned some interesting things, especially that a fix for the Oracle oradebug “disable auditing” problem is available since 9 months.
Oradebug allows to run OS commands and to enable/disable Oracle SYSDBA (more...)
While I was not surprised that the U.S. intelligence agencies monitor web activity, I was surprised at the scale revealed by the Edward Snowdon leaks.
If there are still American cloud providers that do not routinely provide the NSA with wholesale access to their customers’ data, it will only (more...)