Tag: Security
-
Homomorphic Encryption
Homomorphic encryption: computation on encrypted databases without ever decrypting them. An important step that should eventually allow even the most privacy focused institutions off-loading some of their data processing into public clouds.… Continued
-
Epic Hacking
Why can’t I get rid of the nagging feeling that this guy asked the hacker himself to do it, to get a great story into Wired and everywhere? Staged like this, the story is much better than if he simply reported that it was theoretically possible to remote wipe somebody’s iDevices just by abusing Amazon’s and Apple’s flawed password reset routines.… Continued
-
April 2011 Critical Patch Update Released
Already 3 months gone by? April 2011 Critical Patch Update Released (direct link to Database vulnerabilities). Mostly obscure components that aren’t in widespread use in the DB world, but who knows…
-
Intel’s McAfee Acquires Sentrigo To Boost Database Security Offerings
Intel’s McAfee Acquires Sentrigo To Boost Database Security Offerings. That’s not surprising, given that Sentrigo has the best product in that space. Oracle already acquired Secerno last year, so other vendors now have to build their portfolio.… Continued
-
Oracle Database Firewall
Oracle recently released it’s Oracle Database Firewall.
[The] release of Oracle Database Firewall is the culmination of the company’s acquisition of database security vendor Secerno last year. The product creates a defensive perimeter around databases by looking at SQL statements sent to the database through the wire to determine whether to pass, log, alert, block, or substitute SQL statements based on an organization’s policies.… Continued
-
January 2011 Oracle Critical Patch Update Released
It’s that time of the year again: January 2011 Oracle Critical Patch Update Released. People using OEM Grid Control on 11g versions and people using RAC on 10g and newer are vulnerable to remote vulnerabilities not requiring authentication, so again quite a serious CPU.… Continued
-
What are the criteria used by Oracle to decide whether a vulnerability warrants a fix in the CPU?
Oracle answer one of the most asked questions around CPUs: What are the criteria used by Oracle to decide whether a vulnerability warrants a fix in the CPU?
-
NoSQL and Cloud Security
NoSQL and Cloud Security: it’s in a bad shape, says Jeff Darcy, so pretty much single-user only on firewalled machines. Make sure you know what you’re doing!