Monthly Archives: January 2015

Selling security by hacking influence (Part 3)

I’m still not quite done with the topic of how to convince organizations to work on improving security, a topic that I started after visiting the Security Roundtable at the UKOUG Tech 2014. This is part 3 of the blogpost … Continue reading

Posted in Getting a life, Oracle security | Tagged , , , , , , , , , , | Leave a comment

Can we do without encryption?

Of course not. Don’t be rediculous.

Posted in Oracle security | Tagged , , | Leave a comment

Selling security by hacking influence (Part 2)

I’m still not quite done with the topic of how to convince organizations to work on improving security, a topic that I started after visiting the Security Roundtable at the UKOUG Tech 2014. This is part 2 of the blogpost … Continue reading

Posted in Oracle security | Tagged , , , , , | 1 Comment

Selling security by hacking influence (Part 1)

At the Security Roundtable at the UKOUG Tech 2014, an important topic was how we can convince organizations to work on improving security. This is a continuation of the blogpost series “How can we sell security”. Only this third part grew so … Continue reading

Posted in Oracle security | Tagged , , , , , , | Leave a comment