Oracle Security Under ScrutinyOracle Security Under Scrutiny
As the number of vulnerabilities in its products grows, Oracle is on the defensive.
March 4, 2006

Rencken acknowledges that it took time to learn how to best communicate with Oracle, but since figuring that out, interactions have been smooth. Welch has an ace in the hole: a database administrator who used to work for Oracle and understands its patch process. Welch keeps in close contact with the vendor and even has an Oracle employee on its IT steering committee. Support for Oracle products consists of three in-house database administrators and contracted help from an offshore Oracle support center.
Rencken saves his worrying for wireless communications devices placed in the hands of Welch employees. A cell phone left in a taxi creates the opportunity for someone to access Outlook and other important data. Spyware and E-mailed viruses are another general security concern as they threaten to harm the company's network and snatch important information through key-logging programs. Back-end infiltration into databases, while a serious problem if it happens, is less of a priority because it's perceived as less likely as long as Oracle continues to patch vulnerabilities, Rencken says.
strong>Inside Job
About the Author(s)
You May Also Like
Evolution in ITSM: Navigating the New Horizon
Sep 12, 2023Cloud Crisis Management
Aug 30, 2023A Halloween Special: What We Do with AI in the Shadows -- and How to Get it Into the Sunlight
Oct 02, 2023[Virtual Event] DevSecOps Essentials That Enable Efficient Security
Oct 04, 2023[Virtual Event] DevSecOps Essentials That Enable Efficient Security
Sep 14, 2023