Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PUBLIC Role in Oracle

Roles make it easier to grant and revoke privileges for users of a relational database. Rather than managing privileges for each user individually, you manage privileges for each role and all changes apply to all users who are assigned that role. Organizations often create multiple roles to suit their unique needs. However, most databases come with a pre-defined role called PUBLIC. In this blog, we explain what the PUBLIC role means in Oracle and key best practices for using it.

Unconstrained Delegation

Unconstrained delegation represents a serious cybersecurity risk. By taking steps to abuse the Active Directory delegation controls applied to user and computer objects in an AD environment, an attacker can move laterally and even gain control of the domain. This blog post explores this area of attack (unconstrained delegation) and offers security teams and administrators effective strategies for mitigating this security risk.

7 Factors To Consider For Selecting The Best Code Signing Certificate Provider

Every wise software developer and publishing firm knows the importance of a code signing certificate for their executables, codes, and scripts. For the uninitiated, code signing helps give your software a mark of genuine and trusted publisher for users to download and install. Moreover, it safeguards your executables with a digital signature and alerts users if they are altered or modified after signing.

Quick Tips for Email Security

Email is embedded into the everyday lives of U.S. adults. For starters, the average person receives over 100 emails a day. To sort through all of that, workers spend an average of five hours a day checking their email. With this communication tool demanding so much of our attention, it’s no wonder cybercriminals use it as a preferred method for carrying out major attacks.

"A data viz expert is like a language translator."

Timerie Bahler is no stranger to digging deep into the data of organizations – from telecommunications to trucking and finance companies. Many different industries, with many different challenges. What they all have in common is that somewhere in the data there’s always something new to discover that has the power to enhance operations and bottom lines. And that keeps Timerie motivated, professionally, as she turns ostensibly hidden information into actionable insight.

5 Consumer Data Protection Tips For Your SaaS Business

SaaS (Software as a Service) companies cannot function without certain consumer data. For starters, you’ll need the customers’ names and email addresses for your marketing and sales operations. And as leads turn into customers, you may also need their payment details. Now, as your company collects more consumer data, it also becomes a target for data breaches. Remember the March 2022 HubSpot security incident?

Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies

CrowdStrike Services reviews a recent, extremely persistent intrusion campaign targeting telecommunications and business process outsourcing (BPO) companies and outlines how organizations can defend and secure their environments.

Security Awareness Training for Employees - Tips to Protect Your Staff At Co-Working Spaces

As an owner of a co-working space, you must ensure that the employees are trained to stay safe. It is because they will be responsible for handling various tasks and responsibilities. You can do this by providing them with safety training courses. In addition, it will help them be aware of the dangers they may face while working in your business. Here are a few tips to protect your employees in co-working spaces.

The troubles of being on Cloud9: Why your browsers are not safe

With the new browser botnet, Cloud9, waiting to penetrate your browsers remotely to access and steal your sensitive and confidential data, it can be challenging to stay safe while browsing the internet. As reported by Bleeping Computer, this Remote Access Trojan named Cloud9 allows cyberattackers to execute commands remotely to steal your data. This malicious extension is not found in the Chrome store, but has been reported to be installed by other means. What’s the story of Cloud9?