{"id":12601,"date":"2019-06-26T15:23:13","date_gmt":"2019-06-26T13:23:13","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/"},"modified":"2023-07-19T16:28:18","modified_gmt":"2023-07-19T14:28:18","slug":"evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/","title":{"rendered":"Evenement Oracle : Dans la t\u00eate d&#8217;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles"},"content":{"rendered":"<p><strong>By Mouhamadou Diaw<\/strong><\/p>\n<p>Pour une fois un blog en fran\u00e7ais parce que concernant un \u00e9v\u00e9nement Oracle en Fran\u00e7ais.<br \/>\nAujourd\u2019hui chez Oracle Suisse \u00e0 Gen\u00e8ve, il y\u2019avait une pr\u00e9sentation concernant la s\u00e9curit\u00e9 Oracle.<br \/>\nIl s\u2019agissait de se mettre \u00e0 la place d\u2019un Hacker pour mieux appr\u00e9hender leurs d\u00e9marches et ensuite comment prot\u00e9ger les donn\u00e9es dans une base de donn\u00e9es Oracle.<br \/>\nComprendre les intentions et moyens utilis\u00e9s par les Hackers pour parvenir \u00e0 leurs fins nous aide \u00e0 mieux les combattre.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33251\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image1.png\" alt=\"\" width=\"300\" height=\"180\" \/><br \/>\nLa s\u00e9ance \u00e9tait anim\u00e9e par Hakim Loumi &#8211; EMEA DB Security PM<br \/>\nDans un premier temps le conf\u00e9rencier a montr\u00e9 une estimation de l\u2019accroissement des donn\u00e9es d\u2019ici 2025. Waw 175 Zb<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33252\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image2.png\" alt=\"\" width=\"300\" height=\"171\" \/><br \/>\nEt comment ces donn\u00e9es pouvaient \u00eatre sensitives<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33253\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image3.png\" alt=\"\" width=\"300\" height=\"170\" \/><br \/>\nImpressionnant le nombre d\u2019attaques dans le monde<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33254\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image4.png\" alt=\"\" width=\"300\" height=\"123\" \/><br \/>\nHakim a aussi montr\u00e9 pourquoi le Hacking \u00e9tait devenu un de fl\u00e9aux les plus importants. Dans ce slide ci-dessous pour un investissement de moins de moins de 10$, une identit\u00e9 compl\u00e8te revenait en moyenne \u00e0 240$. Quelle rentabilit\u00e9 !!!!!<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33255\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image5.png\" alt=\"\" width=\"300\" height=\"166\" \/><br \/>\nEvidemment la base de donn\u00e9es est une cible principale des attaques<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33256\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image6.png\" alt=\"\" width=\"300\" height=\"165\" \/><br \/>\nLe conf\u00e9rencier a ensuite pr\u00e9sent\u00e9 les principaux outils fournis par Oracle, principalement n\u00e9cessitant l\u2019option Advanced Security Option<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33257\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image7.png\" alt=\"\" width=\"300\" height=\"166\" \/><br \/>\nData Masking<br \/>\nData Redaction<br \/>\nOracle Firewall<br \/>\nDatabase vault<\/p>\n<p>Et pour terminer sur ce joli slide<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33258\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2019\/06\/image8.png\" alt=\"\" width=\"300\" height=\"165\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>L&#8217;\u00e9venement \u00e9tatit vraiment int\u00e9ressant. Le conf\u00e9rencier par des exemples, des anecdotes simples a su capter l&#8217;attention du public. On retiendra surtout dans cette pr\u00e9sentation que la s\u00e9curit\u00e9 des donn\u00e9es, n&#8217;est pas que l&#8217;affaire du DBA. En effet c&#8217;est toute une chaines de proc\u00e9dures incluant tout le monde dans l&#8217;entreprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mouhamadou Diaw Pour une fois un blog en fran\u00e7ais parce que concernant un \u00e9v\u00e9nement Oracle en Fran\u00e7ais. Aujourd\u2019hui chez Oracle Suisse \u00e0 Gen\u00e8ve, il y\u2019avait une pr\u00e9sentation concernant la s\u00e9curit\u00e9 Oracle. Il s\u2019agissait de se mettre \u00e0 la place d\u2019un Hacker pour mieux appr\u00e9hender leurs d\u00e9marches et ensuite comment prot\u00e9ger les donn\u00e9es dans une [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":12602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[229],"tags":[],"type_dbi":[],"class_list":["post-12601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-database-administration-monitoring"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Evenement Oracle : Dans la t\u00eate d&#039;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evenement Oracle : Dans la t\u00eate d&#039;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles\" \/>\n<meta property=\"og:description\" content=\"By Mouhamadou Diaw Pour une fois un blog en fran\u00e7ais parce que concernant un \u00e9v\u00e9nement Oracle en Fran\u00e7ais. Aujourd\u2019hui chez Oracle Suisse \u00e0 Gen\u00e8ve, il y\u2019avait une pr\u00e9sentation concernant la s\u00e9curit\u00e9 Oracle. Il s\u2019agissait de se mettre \u00e0 la place d\u2019un Hacker pour mieux appr\u00e9hender leurs d\u00e9marches et ensuite comment prot\u00e9ger les donn\u00e9es dans une [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-26T13:23:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T14:28:18+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"359\" \/>\n\t<meta property=\"og:image:height\" content=\"215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Oracle Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oracle Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\"},\"author\":{\"name\":\"Oracle Team\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee\"},\"headline\":\"Evenement Oracle : Dans la t\u00eate d&#8217;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles\",\"datePublished\":\"2019-06-26T13:23:13+00:00\",\"dateModified\":\"2023-07-19T14:28:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\"},\"wordCount\":306,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg\",\"articleSection\":[\"Database Administration &amp; Monitoring\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\",\"name\":\"Evenement Oracle : Dans la t\u00eate d'un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg\",\"datePublished\":\"2019-06-26T13:23:13+00:00\",\"dateModified\":\"2023-07-19T14:28:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg\",\"width\":359,\"height\":215},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evenement Oracle : Dans la t\u00eate d&#8217;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee\",\"name\":\"Oracle Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"caption\":\"Oracle Team\"},\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/oracle-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Evenement Oracle : Dans la t\u00eate d'un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/","og_locale":"en_US","og_type":"article","og_title":"Evenement Oracle : Dans la t\u00eate d'un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles","og_description":"By Mouhamadou Diaw Pour une fois un blog en fran\u00e7ais parce que concernant un \u00e9v\u00e9nement Oracle en Fran\u00e7ais. Aujourd\u2019hui chez Oracle Suisse \u00e0 Gen\u00e8ve, il y\u2019avait une pr\u00e9sentation concernant la s\u00e9curit\u00e9 Oracle. Il s\u2019agissait de se mettre \u00e0 la place d\u2019un Hacker pour mieux appr\u00e9hender leurs d\u00e9marches et ensuite comment prot\u00e9ger les donn\u00e9es dans une [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/","og_site_name":"dbi Blog","article_published_time":"2019-06-26T13:23:13+00:00","article_modified_time":"2023-07-19T14:28:18+00:00","og_image":[{"width":359,"height":215,"url":"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg","type":"image\/jpeg"}],"author":"Oracle Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Oracle Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/"},"author":{"name":"Oracle Team","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"headline":"Evenement Oracle : Dans la t\u00eate d&#8217;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles","datePublished":"2019-06-26T13:23:13+00:00","dateModified":"2023-07-19T14:28:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/"},"wordCount":306,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg","articleSection":["Database Administration &amp; Monitoring"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/","url":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/","name":"Evenement Oracle : Dans la t\u00eate d'un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg","datePublished":"2019-06-26T13:23:13+00:00","dateModified":"2023-07-19T14:28:18+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/image1.jpg","width":359,"height":215},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/evenement-oracle-dans-la-tete-dun-hacker-comment-proteger-vos-donnees-sensibles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Evenement Oracle : Dans la t\u00eate d&#8217;un Hacker &amp; Comment prot\u00e9ger vos donn\u00e9es sensibles"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee","name":"Oracle Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","caption":"Oracle Team"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/oracle-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/12601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=12601"}],"version-history":[{"count":2,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/12601\/revisions"}],"predecessor-version":[{"id":26856,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/12601\/revisions\/26856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/12602"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=12601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=12601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=12601"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=12601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}