CISO Perspectives: Detecting Malicious Activity and Signs of an Attack against your OCI Tenancy
Blog: Oracle BPM
This is the second in a series of three blogs designed to help you understand how OCI can help you protect, detect and recover from ransomware attacks. In this blog we will discuss the OCI services and capabilities that fall under the Detect stage and that can be used to uncover these signs of malicious activity and signs that your OCI tenancy has been compromised.