Blog

Latest Posts

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More

Enhance Oracle Security with DSP-Eclipsys HEROS Framework for Proactive Monitoring

Why Best-Practice Security Ops Start with Proactive Health Monitoring – And How the DSP-Eclipsys HEROS Framework Delivers

Read More

Oracle 23ai DB Creation in an ExaCC Fails with DBAAS-60022

If you’re working with Oracle Exadata Cloud@Customer (ExaCC), you may encounter unexpected failures when provisioning a new Oracle 23ai database using the standard dbaascli..

Read More

Oracle Cloud Breach: What CIOs Need to Know — and Do — Right Now

A couple of weeks ago, reports emerged of a cyber threat actor selling what they claim to be 6 million records stolen from Oracle Cloud’s Single Sign-On (SSO) and LDAP systems...

Read More

Lessons from PowerSchool Database Restore

This blog is my musing from my recent client visit. I recently got summoned to help a client restore services after a cyberattack incident. This client is running Oracle..

Read More

EXACS: Resolving PDB Console Issue

Introductions The roles of DBAs and architects are continually evolving, becoming more technical and requiring broader expertise. For Oracle DBAs, it's no longer just about..

Read More