On almost every cloud call I have, the customer will always ask, is their data secure, will the cloud hurt performance, and what about availability?… Read more
Oracle has announced the expansion of the Oracle Government Cloud with National Security Regions for US Intelligence Community and Department of Defense customers. This is… Read more
Team Mythics has been hard at work preparing for Oracle OpenWorld 2019, and we are looking forward to arriving in San Francisco! You can find… Read more
Team Mythics has been busy preparing for Oracle OpenWorld 2018, and we are so excited to get to San Francisco! You can find our schedule… Read more
Connect with Mark Johnson on LinkedIn! Every day, Information Technology departments are becoming more critical to the business of their organization. To increase their focus on the… Read more
Connect with Erik Benner on Twitter! When I discuss cloud, I often talk about what the cloud should do and not where it runs. First… Read more
The Oracle Cloud teams have developed and deployed new Cloud VM images in response to the Intel processor design flaws leading to vulnerabilities CVE-2017-5715 (Spectre… Read more
Connect with Erik Benner on Twitter! Worried about the security of your data? Did you know that SPARC+Solaris servers are not only Meltdown free, but also the… Read more
Connect with Mark Johnson on LinkedIn! Government Information Security Officers are rightfully concerned about security of their data and systems and this week’s revelations of the Meltdown and Spectre vulnerabilities at… Read more
Your Users Are Your Security Perimeter, Understanding the Next Generation of Security Technologies. The need for Security is changing, no longer can you protect your… Read more
Mythics Creates a Secure Private Cloud Roadmap for Cloud-Based Electronic Health Record (EHR) Provider Welligent See a fantastic video below highlighting Healthcare provider Welligent, with… Read more
The Power of WebLogic Scripting Recently, I found myself needing to write a script to change JDBC Data Source properties on the fly and restart… Read more
At the core of a biometric system is the one-to-many identification process, where the input sample is compared with the stored templates in the biometric… Read more
National Institute of Standards and Technology (NIST) announced the Final Release of Special Publication (SP) 800-53, Revision 4, “Security and Privacy Controls for Federal information… Read more
When conducting a security vulnerability assessment using an automated scanner on a large number of hosts, it is very tempting to create one or more… Read more
Federal Information Processing Standards (FIPS) 140-2 is used to accredit cryptographic modules (hardware and software) used on federal government computer systems that process sensitive information. … Read more
Sarbanes-Oxley Act (SOX) set up new and enhanced standards that public companies must follow. However, the impact is not just on the company board, management… Read more
The Federal Information Security Management Act (FISMA) of 2002 has been the cornerstone for information security in Federal Government for the last 11 years. It… Read more
“Et tu Wordpress!” – paraphrased from Julius Caesar Act III, Scene I If Shakespeare blogged, I wonder if he would have used Wordpress? I don't have… Read more
Pillows come in different sizes and shapes and they can have different colors, styles, cushions, and features. However, the best pillow is not necessarily the… Read more
A broad range of security controls can be implemented to protect databases, including technical, administrative and physical. On the technical side, vendors, like Oracle, have… Read more