Oracle Information InDepth

SECURITY INSIDE OUT EDITION

Oracle

Stay Connected

Database Security

Oracle on Twitter Oracle on Facebook Oracle Blog

Identity Management

Oracle on Twitter Oracle on Facebook Oracle Blog 

June 2014

Subscribe Subscribe Forward Forward
 

Back to the main page

Know Your Enemy: Profile Attackers and Defend Targeted Assets

In The Art of War, Sun Tzu writes, "Know your enemies and know yourself." In the world of enterprise security, that means knowing who wants to access your sensitive data—and understanding whether or not your security systems are providing a sufficient defense against these threats.

In the new Countering Adversaries webcast series now available on demand, security experts explain how to identify the kinds of adversaries specific industries attract, understand the types of data they are after, and focus in on the tools that provide the most effective deterrence against these specific threats.

The webcast series, created in cooperation with security consortium (ISC)2, builds on conclusions from the 2014 Verizon Data Breach Investigations Report, which identifies three distinct threat actors: hacktivists, organized crime, and espionage.

The webcast three-part series includes:

  • Espionage and Stolen Credentials
    Espionage-related attacks are very targeted. Such attackers know exactly what they are after and work methodically to get it—often spending years gathering data. These types of attacks, known as advanced persistent attacks—or APTs—are especially effective. Learn how to detect and prevent this kind of attack.
  • Organized Crime and Brute Force
    Organized criminals tend to use brute-force hacking and multiple strands of malicious software code to target financial and retail organizations for monetary gain, according to the Verizon report. They often try to gain direct access to databases and extract payment card details, credentials, and bank account information. This webcast examines ways organizations can implement a defense-in depth database security strategy to prevent such attacks.
  • SQL Injection Attacks
    Usually, hacktivists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. Their tool of choice: SQL injection attacks, which can be both simple to perform and difficult to detect. This webcast explores ways to block SQL injection attacks and protect highly sensitive customer and organizational data.

Watch the on-demand Countering Adversaries webcast series to learn key threat vectors that target your industry, and how best to mitigate them. Bookmark the Oracle Database security resources site today to stay up to date on the latest security information from Oracle.

Back to Top
 
 

Please send questions or comments to newsletter_feedback_us@oracle.com.

This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor is it subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.

Copyright © 2014, Oracle and/or its affiliates. All rights reserved.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

  Hardware and Software, Engineered to Work Together Contact Us | Legal Notices and Terms of Use | Privacy Statement
 
Oracle Corporation

NSL100316438

Oracle Corporation - Worldwide Headquarters, 500 Oracle Parkway, OPL - E-mail Services, Redwood Shores, CA 94065, United States

Your privacy is important to us. You can login to your account to update your e-mail subscriptions or you can opt-out of all Oracle Marketing e-mails at any time.

Please note that opting-out of Marketing communications does not affect your receipt of important business communications related to your current relationship with Oracle such as Security Updates, Event Registration notices, Account Management and Support/Service communications.