Can We Make a Column Read-Only in Oracle?When it comes to fine-grained database security, most examples focus on the read scenario — hiding certain rows or columns for specific…Oct 17Oct 17
Unifying Identity and Data Security: Real Application Security with Active DirectoryIt’s no surprise that I’m a big fan of the Real Application Security (RAS) feature in the Oracle Database. RAS makes it possible to enforce…Sep 30Sep 30
Securing CI/CD Pipelines with Oracle Database VaultIn a recent article on securing sensitive data, I emphasized the importance of using the right database accounts when interacting with the…Sep 2Sep 2
Elevating Oracle Database Security for Safer SQLcl MCP Server and Agentic AI UsageRecently, I’ve been experimenting with the new MCP Server feature in SQLcl, and I quickly reached two conclusions:Aug 22A response icon1Aug 22A response icon1
Oracle Label Security in APEX: RAS to the rescue !Recently, I’ve been working on an Oracle Label Security (OLS) architecture, and the target technology for developing the application was…Jul 11Jul 11
Protecting Vectorised Data in RAG Applications with Oracle 23ai Real Application SecurityThe Security Challenges of Vector Databases in a RAG ArchitectureJun 13Jun 13
Oracle SQL AI : How to Secure the Data Accessed Behind the Scenes ?In the Oracle Database 23ai version, a cool new feature has been introduced: the SQL AI syntax, which allow you to query the database…Apr 18Apr 18
Distribution and Segregation of data secured with Oracle Label SecurityNowadays, many organisations are replicating data from their Oracle database to other Oracle databases. Several tools can be used to…Apr 8Apr 8