process management blog posts

CISO Perspectives: Detecting Malicious Activity and Signs of an Attack against your OCI Tenancy

Blog: Oracle BPM

This is the second in a series of three blogs designed to help you understand how OCI can help you protect, detect and recover from ransomware attacks. In this blog we will discuss the OCI services and capabilities that fall under the Detect stage and that can be used to uncover these signs of malicious activity and signs that your OCI tenancy has been compromised.