Call: +44 (0)7759 277220 Call
Blog

Pete Finnigan's Oracle Security Weblog

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

[Previous entry: "59 Security bugs fixed, 28 remotely expolitable, 13 in the database"] [Next entry: "Data Breach Survey Results"]

The second IOUG / Oracle Security Assurance Survey



I wrote about the first IOUG joint security survey with Oracle two years ago here in my blog in a post titled "An Oracle Security Survey by The IOUG and Oracle" and I encouraged participation on the survey. The second survey is now available now. The survey is worth while as its your chance to influence the security assurance team within Oracle and also to help get some idea of whats going on in the community. The offiial text for the survey is:

Oracle and the Independent Oracle User Group (IOUG) are launching a new security assurance survey. The purpose of this survey http://ioug.itconvergence.com/pls/apex/f?p=201:19:2332809242507089::NO - (broken link) is to gather feedback from as many organizations as possible about their security patching practices and to identify which security assurance topics are most relevant to Oracle customers.

The IOUG participates in Oracle’s Secure Customer Advisory Council and has worked with Oracle Global Product Security on this survey which will provide meaningful feedback to Oracle about its security programs. For example, the current survey provides respondents with a chance to give feedback about Patch Set Updates (PSUs) and the CPU documentation. Survey responses will be kept confidential, and the results will be analyzed jointly by Oracle and IOUG to evaluate Oracle’s security assurance practices The survey is located here http://enterprisesig.oracle.ioug.org/ (free SIG membership is required to access the survey).


As I did two years ago I encourage everyone to take part and add some influence to the security patching process. Thanks!