In the previous article, I discussed the main differentiating capabilities of the Autonomous, what makes it special on the market. In this post, I will discuss how are those capabilities implemented.
Continue reading “Is Oracle Autonomous Database the answer to the many database security issues? (II)”Is Oracle Autonomous Database the answer to the many database security issues? (I)
There is no surprise that typical Database setups are the main target of the hacking attacks worldwide. The reason is obvious: cracking a database will result in access to the data which is the main ‘merchandise’ to be shared or sold on the dark corners of the World Wide Web.
Continue reading “Is Oracle Autonomous Database the answer to the many database security issues? (I)”