Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..
Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..
Why Best-Practice Security Ops Start with Proactive Health Monitoring – And How the DSP-Eclipsys HEROS Framework Delivers
If you’re working with Oracle Exadata Cloud@Customer (ExaCC), you may encounter unexpected failures when provisioning a new Oracle 23ai database using the standard dbaascli..
A couple of weeks ago, reports emerged of a cyber threat actor selling what they claim to be 6 million records stolen from Oracle Cloud’s Single Sign-On (SSO) and LDAP systems...
This blog is my musing from my recent client visit. I recently got summoned to help a client restore services after a cyberattack incident. This client is running Oracle..
Introductions The roles of DBAs and architects are continually evolving, becoming more technical and requiring broader expertise. For Oracle DBAs, it's no longer just about..