Title | Summary | File | |
---|---|---|---|
WebLogic Vulnerabilities - PeopleSoft Impact (CVE-2020-14882 and CVE-2020-14750) |
... |
Security Resources | File |
WebLogic Vulnerabilities - Oracle E-Business Suite Impact (CVE-2020-14882 and CVE-2020-14750) |
As part of the Oracle October 2020 Critical Patch Update (CPU), two critical vulnerabilities were fixed in the Oracle WebLogic web application... |
Security Resources | File |
PeopleSoft and ElasticSearch Security Examined |
ElasticSearch and Kibana will continue to be an integral part of PeopleSoft applications in the future. With the introduction of any new... |
Whitepapers and Presentations | File |
Change Your Thinking About Security with Oracle Database in the Cloud |
How does database security change when you move to the Cloud? Security does change and how to handle database security needs to change when... |
Security Resources | File |
Upcoming Webinar: Is Your Sensitive Data Playing Hide and Seek with You? | Oracle Security Blog | ||
Leveraging New Oracle Database 19c Security Features with the Oracle E-Business Suite |
Oracle 19c database is now certified with the E-Business Suite. Oracle 19c delivers several new important security features that will be of value... |
Security Resources | File |
Effective Auditing and Logging in Oracle E-Business Suite |
The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most... |
Security Resources | File |
Oracle E Business Suite and Java Security What You Need to Know |
"Java is the biggest vulnerability for US computers" states CSO Magazine. The Oracle E-Business Suite (EBS) runs on Java - both the server and... |
Security Resources | File |
Hacking an Oracle Database and How to Prevent It |
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable... |
Security Resources | File |
PeopleSoft Top 10 Security Risks |
PeopleSoft is a complex application with multiple tiers and technologies, which makes properly securing the environment challenging. This... |
Whitepapers and Presentations | File |