SQL Server Security

Security has always been a pressing concern even for the most seasoned DBA. Regardless of versions and editions, SQL databases are under constant threat as they hold sensitive data, and that is what the malicious hackers want to access.

Read More

Security on PostgreSQL and RDS

This blog describes how to set up the security in PostgreSQL and AWS Aurora and related best practices. The Database security refers to a set of procedures and policies that safeguard data. It becomes crucial to understand its significance.

Read More

Enabling Multi-Factor Authentication (MFA) in Azure AD

MFA is where users are prompted /required to authenticate with additional verification using additional form of identity verification.

MFA is a way to secure your apps and data by requiring users to use another form of verification. Also, MFA gives additional security by introducing an additional form for verification and provide strong authentication by a range of simple-to-use validation methods.

Read More

Implementation of DUO and SAML in E-business suite 12.2

This blog covers steps on how to implement Multi Factor Authentication (MFA) for E-business suite, and Security Assertion Markup Language (SAML).

Read More

Simplifying Standby Data Guard Setup using broker configuration

With Growing business demands and volume, grows the necessity of having a fault tolerant system. A system that will still be available in case of any natural disaster. There are scenarios when systems need to be taken down for scheduled maintenance. But what if the business demands do not allow the system to be taken down? The answer is to have a Disaster Recovery site (DR).

Read More

Take a self-guided tour of Cloudflare’s Zero Trust platform

Rackspace offers Cloudflare’s Zero Trust platform which consolidates many once distinct technology solutions — Zero Trust Network Access, Secure Web Gateway, DNS Filtering, Cloud Access Security Broker (CASB), and more — into a single, natively integrated platform.

Read More

URL FIREWALL for External Node/DMZ

When configuring Oracle E-Business Suite in a DMZ configuration, you can deploy firewalls at different levels to restrict access to only the web pages required for the business.

Read More

Automation Tool to reset SAP passwords and the locking/unlocking of SAP users

It all started with a discussion with one of my colleagues who is working as an SAP security consultant.

Read More

Security for Oracle Database Listener

The Oracle Database listener is a module that connects an instance of the Oracle Database and its client. It is, therefore, important to ensure that this component is kept secure from cyber threats and attacks

Read More

Deception Technology– The new frontier of defense against cyberthreats

Deception technology is a new and exciting frontier for cyber resilience against bad actors and cyber threats.

Read More