Monthly Archives: February 2015

No. If I can’t hack you, you are not secure.

Ever come up against this issue?¬†You see that something in the IT infrastructure is set up in a less than sanitary way: for example the application has dynamic SQL, or the security of the database relies on the application. One … Continue reading

Posted in Oracle security | Tagged , , , | Leave a comment