(Mark Brunelli) Authenticating the identities of users on a system is an important aspect of Oracle security, but when identities are stolen, experts say the next line of defense is proper authentication of the transactions that users set in motion. (R)
Read More - Register for Free Membership
