An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
A filter that allows incoming database connections to be approved or rejected based on the values of their sys_context parameters.
It's a new year, and therefore time to start a new series of posts. This year I will be looking at how to secure Oracle on a limited budget (or more commonly a non-existant one), with an emphasis on what can be done for little or no additional cost beyond the basic hardware and software … Continue reading And Now for Something Completely Different…
The core of virtually every application that manipulates data is the database. It is vitally important, in both production and development environments, to understand at all times what the database is doing and why. There are a variety of commercial database monitoring solutions available in the market today; most rely on SQL monitoring and monitoring … Continue reading Real-Time Oracle 11g Log File Analysis
A business or organization can only be successful if its critical data is well managed and secure. Every day the news is filled with stories of corporations, financial institutions, and governments whose data systems have been compromised. Tightly configured network architectures which limit the direction and channels through which data flows can greatly reduce the … Continue reading Deploying an Oracle 11gR2 Connection Manager