New HCM features in Image 28

HCM Image 28 has many new features, and while some may not apply to your organization, you’ll likely be pleased by the ones that help you improve processes, simplify, and perhaps, allow you to retire a customization that now is met by out-of-the-box functionality. This quarter’s Image brings 28 improvements [...]

By |2019-11-11T12:12:35-05:00February 26th, 2019|Oracle|

Managing PeopleSoft Security

Managing PeopleSoft security is an important component of managing your system. We find that system security is oftentimes an afterthought, especially during an implementation or an upgrade. This can result in security being perceived as an obstacle by users rather than a positive system module. [...]

By |2019-09-11T09:48:21-04:00June 1st, 2017|Oracle|

Security Matters

While many aspects of PeopleSoft security have not really changed much since I was first introduced to the product as a university student worker, there have actually been a lot of changes over the past 19 years, especially with Campus Solutions. From my early days as a student worker as [...]

By |2019-09-11T10:03:22-04:00March 12th, 2015|Higher Education|

The Cloud Authentication Challenge

Everyone “knows” that one of the largest issues holding back wider adoption of the Cloud is security. How can information that is stored in the Cloud be truly secure? The reason the Cloud is so challenging is that many people, both technical and non-technical, don’t fully understand what technologies [...]

By |2019-09-11T10:03:25-04:00February 17th, 2015|Cloud|

Marketing Security through the KISS Principle

As we know from our own life experiences, at times we need to be sold the idea that we need or desire a product, hence the birth of marketing. For those of us that are security practitioners, we are constantly challenged with finding the right method to get our message [...]

By |2019-09-11T16:02:07-04:00January 27th, 2012|Security|

Yet Another “Good Password” Article

There are a myriad of articles on the web about picking good passwords; just go to Google and type in ‘how to choose a good password’ and you’ll get 127 million hits (seriously). Yet despite that, it amazes me that people still make poor choices when it comes to password [...]

By |2019-09-11T17:24:25-04:00November 17th, 2011|Security|