fbpx
 

Category: Identity management

How Data Loss Prevention Technology Can Help You

Data Loss Prevention (DLP) is one of the key IT security measures a company must undertake. DLP is one of the 20 Critical IT Security Controls that the nonprofit security training agency SAN recommends. A recent news item provides a great real life of how Nationwide Insurance used DLP technology to prevent an employee’s unlawful activities. Nationwide recently installed new monitoring software to prevent unlawful transmission of data by its employees. The software snagged Qiang “Michael” Bi, a 36-year old […]

Using Oracle Database Firewall

We’re all familiar with network firewalls, which prevent unauthorized access to your network from external sources. However, network firewalls don’t protect your databases from malicious attacks, which sometimes come disguised as privileged internal users. Web applications are a major source of data attacks, through stratagems such as SQL Injection, for example. Oracle’s Database Firewall (a product Oracle gained through its acquisition of Secerno, a British firm, in 2010) offers a solid defensive perimeter to monitor and enforce accepted behavior on […]

The New Ponemon Institute End Point Security Report

Ponemon Institute has just (Dec 2010) released a new State of Endpoint report (http://www.lumension.com/Media_Files/Documents/Marketing—Sales/Others/Ponemon—State-of-Endpoint-Risk.aspx). The study, sponsored by Lumension, reveals that a full 64 percent of the 570 respondents surveyed report that their networks are less secure than they were a year ago, or they aren’t sure. And 58 percent report that their security costs are increasing, with malware incidents being the main driver of the escalating costs. A very interesting thing to note is the fact that most IT […]

Oracle Advanced Security

Oracle Advanced Security (OAS) is an Option that you can purchase for your Oracle databases. What exactly can OAS do for you? There are two key things that you can do with OAS – encrypt what is called data “at rest” and data “in flight”. The data at test that OAS lets you protect is the data stored on your storage disks, whether they are in database storage or in backup storage. Since your database and backup data is stored […]

Who’s doing what with your data – need for an identity management system and auditing

The sensational revelations of the inside action of international diplomacy are still being revealed by WikiLeaks, which has access to a stash of about a quarter million of secret diplomatic messages between the State department and the U.S. embassies around the world. Of course, the revelations caused a red faced State department to fulminate about violations of national security by Wikileaks. The State department has just unveiled the cloak of mystery regarding exactly how the secret messages were accessed and […]

In Archive