AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
These slides outline how AI is influencing cybersecurity.
Note that they were used in the keynote speech at the event "Defense and Security 2023" held in Thailand on November 8, 2023.
Malware Detection Using Data Mining Techniques Akash Karwande
Computer programs which have a destructive content and applied to systems from invader, are called malware and the systems on which this program are applied is called victim system .
Malwares are classified into several kinds based on behavior or attack methods.
Crime sensing with big data - Singapore perspectiveBenjamin Ang
This presentation examines the Potentials and Limitations of Using Big Data for Crime Estimation. Singapore laws discussed include Personal Data Protection Act (PDPA), Penal Code, Criminal Procedure Code (CPC). Topics covered include Crime Analysis, Crime Prediction, Algorithm Bias, and other risks. The video of this presentation can be found at https://youtu.be/kctB3lRLh2U
Embark on a thrilling exploration of cloud security assessment methods! Discover the latest strategies to safeguard your cloud infrastructure against evolving threats. Join us for actionable insights and practical tips to fortify your defenses. Don't miss out—secure your digital assets with confidence!
Fundamentals Big Data and AI ArchitectureGuido Schmutz
The right architecture is key for any IT project. This is especially the case for big data projects, where there are no standard architectures which have proven their suitability over years. This session discusses the different Big Data Architectures which have evolved over time, including traditional Big Data Architecture, Streaming Analytics architecture as well as Lambda and Kappa architecture and presents the mapping of components from both Open Source as well as the Oracle stack onto these architectures.
The right architecture is key for any IT project. This is valid in the case for big data projects as well, but on the other hand there are not yet many standard architectures which have proven their suitability over years.
This session discusses different Big Data Architectures which have evolved over time, including traditional Big Data Architecture, Event Driven architecture as well as Lambda and Kappa architecture.
Each architecture is presented in a vendor- and technology-independent way using a standard architecture blueprint. In a second step, these architecture blueprints are used to show how a given architecture can support certain use cases and which popular open source technologies can help to implement a solution based on a given architecture.
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
These slides outline how AI is influencing cybersecurity.
Note that they were used in the keynote speech at the event "Defense and Security 2023" held in Thailand on November 8, 2023.
Malware Detection Using Data Mining Techniques Akash Karwande
Computer programs which have a destructive content and applied to systems from invader, are called malware and the systems on which this program are applied is called victim system .
Malwares are classified into several kinds based on behavior or attack methods.
Crime sensing with big data - Singapore perspectiveBenjamin Ang
This presentation examines the Potentials and Limitations of Using Big Data for Crime Estimation. Singapore laws discussed include Personal Data Protection Act (PDPA), Penal Code, Criminal Procedure Code (CPC). Topics covered include Crime Analysis, Crime Prediction, Algorithm Bias, and other risks. The video of this presentation can be found at https://youtu.be/kctB3lRLh2U
Embark on a thrilling exploration of cloud security assessment methods! Discover the latest strategies to safeguard your cloud infrastructure against evolving threats. Join us for actionable insights and practical tips to fortify your defenses. Don't miss out—secure your digital assets with confidence!
Fundamentals Big Data and AI ArchitectureGuido Schmutz
The right architecture is key for any IT project. This is especially the case for big data projects, where there are no standard architectures which have proven their suitability over years. This session discusses the different Big Data Architectures which have evolved over time, including traditional Big Data Architecture, Streaming Analytics architecture as well as Lambda and Kappa architecture and presents the mapping of components from both Open Source as well as the Oracle stack onto these architectures.
The right architecture is key for any IT project. This is valid in the case for big data projects as well, but on the other hand there are not yet many standard architectures which have proven their suitability over years.
This session discusses different Big Data Architectures which have evolved over time, including traditional Big Data Architecture, Event Driven architecture as well as Lambda and Kappa architecture.
Each architecture is presented in a vendor- and technology-independent way using a standard architecture blueprint. In a second step, these architecture blueprints are used to show how a given architecture can support certain use cases and which popular open source technologies can help to implement a solution based on a given architecture.
Delivered 1 - day Practical Threat Hunting workshop at sacon.io in Bangalore,India balancing on developing the threat hunting program in organization, how and where to start from as well threat hunting demos as it would look on the ground with hands on labs for 100+ participants.
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomSudarson Roy Pratihar
Presentation of a successful project executed on telecom fraud analytics @ 3rd International conference for businees analytics and intelligence, Indian Institute of Management Bangalore
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
Amid privacy concerns and after a decade-long battle, the U.S. Cybersecurity Information Sharing Act (CISA) of 2015 was passed. Critics claim CISA is a surveillance bill in disguise; proponents claim the act provides a needed legal framework for information sharing. Can CISA actually improve cyberdefense without risking privacy? Are there unforeseen roadblocks? What about STIX/TAXII?
(Source: RSA USA 2016-San Francisco)
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019anant90
Machine Learning is itself just another tool, susceptible to adversarial attacks. These can have huge implications, especially in a world with self-driving cars and other automation. In this talk, we will look at recent developments in the world of adversarial attacks on the A.I. systems, and how far we have come in mitigating these attacks.
This webinar focuses on how to use graph databases for Identity & Access Management. This webinar is designed for people who work with entitlements, access management, and tracking origins and associations of assets.
Managing and monitoring multiple user authorizations and asset provenance across your enterprise organization is a challenging task. We’ll explore how an interconnected view of your data, gives you better real-time insights and controls than ever before. Neo4j connects your data along intuitive relationships so identity and access management happens quickly and effectively.
In this webinar we’ll start with an overview of Neo4j and Graph-thinking, and continue with exploring some of the use cases showing how Neo4j’s versatile property graph model makes it easier for organizations to evolve identity and access management models.
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
From ATT&CKcon 4.0
By Ozan Olali, IBM Security
The Electronic Flight Bag (EFB) has become an indispensable tool in modern aviation, providing pilots with digital resources and critical flight information. However, the increased reliance on EFB systems running on operating systems, introduces various security challenges. In this session, a technical assessment approach with MITRE ATT&CK framework to perform a comprehensive threat analysis of an EFB solution, will be presented. The potential attack vectors and relation with the risks for business/ flight operations will be demonstrated.
This is a sales deck that was inspired by an article entitled "The Greatest Sales Deck I’ve Ever Seen" on Medium. It can be found here: https://medium.com/the-mission/the-greatest-sales-deck-ive-ever-seen-4f4ef3391ba0
We felt other startup founders might benefit from seeing a version of this concept for a cybersecurity startup. We hope you like it.
How to protect yourself, your family or your team from the most sophisticated cyberattacks that involve phishing.
Threat hunting - Every day is hunting seasonBen Boyd
Breakout Presentation by Ben Boyd during the 2018 Nebraska Cybersecurity Conference.
Introduction to Threat Hunting and helpful steps for building a Threat Hunting Program of any size, from small to massive.
Threat modeling is about thinking what bad can happen and what can you do about it. It can also find logical flaws and reveal problems in the architecture or software development practices. These vulnerabilities cannot usually be found by technical testing.
Threat modeling helps you deliver better software, prioritize your preventive security measures, and focus your penetration testing to the most risky parts of the system. The beauty of threat modeling is that you can assess security already in the design phase. In addition, it is something every team member can participate in because it doesn't require any source code, special skills, or tools. Threat modeling is for everyone: developers, testers, product owners, and project managers.
The presentation covers various methods, such as the STRIDE model, for finding security and privacy threats. You will also learn to analyze use cases for finding business level threats. The presentation also includes practical tips for arranging threat workshops and representing your results.
This presentation was held in the Diana Initiative 2018 and Nixucon 2018 conferences.
Presentation talks about introduction to MITRE ATT&CK Framework, different use cases, pitfalls to take care about.. Talk was delivered @Null Bangalore and @OWASP Bangalore chapter on 15th February 2019.
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
With the ongoing expansion of cloud transformation, the different stages of cloud adoption become instrumental in achieving successful adoption of cloud infrastructure and services. When considering each stage, it’s important to overlay the proper security framework alongside continuous monitoring to provide the necessary security outcomes for an optimal security posture. In this session, we describe how to deliver outcomes of continuous security and compliance through a security wrapper delivered through infrastructure as code. This presentation is brought to you by AWS partner, Armor Cloud Security.
Artificial Intelligence Large Language Models (LLM) and Machine Learning (ML) Application Security Threats and Defenses. OWASP Top Tens for LLM and ML along with software development attack preventative best practices.
Formation complète ici:
https://www.alphorm.com/tutoriel/formation-en-ligne-certified-ethical-hacker-v9-1-4-reussir-ceh-v9
La certification CEH dans sa version 9 est actuellement la plus avancée au monde dans le domaine de l'Ethical Hacking.
Cette formation CEH V9 aborde 18 modules successifs liés aux domaines de la sécurité informatique les plus récents, en détaillant plus de 270 attaques techniques de hacking.
La formation CEH V9 permet à tous les informaticiens et tous les passionnés d'informatique ayant un profil technique de découvrir et de mieux comprendre les modes opératoires, les méthodes employées ainsi plus de 2200 outils utilisés par les pirates informatiques pour contourner et déjouer les protections de sécurité en place.
Cette formation CEH V9 vous aidera à maitriser une méthodologie de piratage éthique qui pourra aussi bien être utilisée dans un test d'intrusion que dans une situation de piratage éthique.
Cette formation CEH V9 est destinée à vous transmettre une vision étendue des variétés d'attaques possibles dans un SI. Vous quitterez avec des compétences en piratage éthique qui sont hautement recherchées.
Cette formation CEH V9 vous permettra d'obtenir l'examen de certification CEH Certified Ethical Hacker.
Delivered 1 - day Practical Threat Hunting workshop at sacon.io in Bangalore,India balancing on developing the threat hunting program in organization, how and where to start from as well threat hunting demos as it would look on the ground with hands on labs for 100+ participants.
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomSudarson Roy Pratihar
Presentation of a successful project executed on telecom fraud analytics @ 3rd International conference for businees analytics and intelligence, Indian Institute of Management Bangalore
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
Amid privacy concerns and after a decade-long battle, the U.S. Cybersecurity Information Sharing Act (CISA) of 2015 was passed. Critics claim CISA is a surveillance bill in disguise; proponents claim the act provides a needed legal framework for information sharing. Can CISA actually improve cyberdefense without risking privacy? Are there unforeseen roadblocks? What about STIX/TAXII?
(Source: RSA USA 2016-San Francisco)
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019anant90
Machine Learning is itself just another tool, susceptible to adversarial attacks. These can have huge implications, especially in a world with self-driving cars and other automation. In this talk, we will look at recent developments in the world of adversarial attacks on the A.I. systems, and how far we have come in mitigating these attacks.
This webinar focuses on how to use graph databases for Identity & Access Management. This webinar is designed for people who work with entitlements, access management, and tracking origins and associations of assets.
Managing and monitoring multiple user authorizations and asset provenance across your enterprise organization is a challenging task. We’ll explore how an interconnected view of your data, gives you better real-time insights and controls than ever before. Neo4j connects your data along intuitive relationships so identity and access management happens quickly and effectively.
In this webinar we’ll start with an overview of Neo4j and Graph-thinking, and continue with exploring some of the use cases showing how Neo4j’s versatile property graph model makes it easier for organizations to evolve identity and access management models.
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
From ATT&CKcon 4.0
By Ozan Olali, IBM Security
The Electronic Flight Bag (EFB) has become an indispensable tool in modern aviation, providing pilots with digital resources and critical flight information. However, the increased reliance on EFB systems running on operating systems, introduces various security challenges. In this session, a technical assessment approach with MITRE ATT&CK framework to perform a comprehensive threat analysis of an EFB solution, will be presented. The potential attack vectors and relation with the risks for business/ flight operations will be demonstrated.
This is a sales deck that was inspired by an article entitled "The Greatest Sales Deck I’ve Ever Seen" on Medium. It can be found here: https://medium.com/the-mission/the-greatest-sales-deck-ive-ever-seen-4f4ef3391ba0
We felt other startup founders might benefit from seeing a version of this concept for a cybersecurity startup. We hope you like it.
How to protect yourself, your family or your team from the most sophisticated cyberattacks that involve phishing.
Threat hunting - Every day is hunting seasonBen Boyd
Breakout Presentation by Ben Boyd during the 2018 Nebraska Cybersecurity Conference.
Introduction to Threat Hunting and helpful steps for building a Threat Hunting Program of any size, from small to massive.
Threat modeling is about thinking what bad can happen and what can you do about it. It can also find logical flaws and reveal problems in the architecture or software development practices. These vulnerabilities cannot usually be found by technical testing.
Threat modeling helps you deliver better software, prioritize your preventive security measures, and focus your penetration testing to the most risky parts of the system. The beauty of threat modeling is that you can assess security already in the design phase. In addition, it is something every team member can participate in because it doesn't require any source code, special skills, or tools. Threat modeling is for everyone: developers, testers, product owners, and project managers.
The presentation covers various methods, such as the STRIDE model, for finding security and privacy threats. You will also learn to analyze use cases for finding business level threats. The presentation also includes practical tips for arranging threat workshops and representing your results.
This presentation was held in the Diana Initiative 2018 and Nixucon 2018 conferences.
Presentation talks about introduction to MITRE ATT&CK Framework, different use cases, pitfalls to take care about.. Talk was delivered @Null Bangalore and @OWASP Bangalore chapter on 15th February 2019.
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
With the ongoing expansion of cloud transformation, the different stages of cloud adoption become instrumental in achieving successful adoption of cloud infrastructure and services. When considering each stage, it’s important to overlay the proper security framework alongside continuous monitoring to provide the necessary security outcomes for an optimal security posture. In this session, we describe how to deliver outcomes of continuous security and compliance through a security wrapper delivered through infrastructure as code. This presentation is brought to you by AWS partner, Armor Cloud Security.
Artificial Intelligence Large Language Models (LLM) and Machine Learning (ML) Application Security Threats and Defenses. OWASP Top Tens for LLM and ML along with software development attack preventative best practices.
Formation complète ici:
https://www.alphorm.com/tutoriel/formation-en-ligne-certified-ethical-hacker-v9-1-4-reussir-ceh-v9
La certification CEH dans sa version 9 est actuellement la plus avancée au monde dans le domaine de l'Ethical Hacking.
Cette formation CEH V9 aborde 18 modules successifs liés aux domaines de la sécurité informatique les plus récents, en détaillant plus de 270 attaques techniques de hacking.
La formation CEH V9 permet à tous les informaticiens et tous les passionnés d'informatique ayant un profil technique de découvrir et de mieux comprendre les modes opératoires, les méthodes employées ainsi plus de 2200 outils utilisés par les pirates informatiques pour contourner et déjouer les protections de sécurité en place.
Cette formation CEH V9 vous aidera à maitriser une méthodologie de piratage éthique qui pourra aussi bien être utilisée dans un test d'intrusion que dans une situation de piratage éthique.
Cette formation CEH V9 est destinée à vous transmettre une vision étendue des variétés d'attaques possibles dans un SI. Vous quitterez avec des compétences en piratage éthique qui sont hautement recherchées.
Cette formation CEH V9 vous permettra d'obtenir l'examen de certification CEH Certified Ethical Hacker.
OTOinsight's MITX presentation titled "Neuromarketing and the User Experience". This is for today's MITX Event (10/29/09) titled "User Experience Techniques: Inspiring Users to Identify What They Didn't Know They Needed".
To be good user experience folks, we need to crack open some psych 101 textbooks, learn what motivates people and then bake these ideas into our designs.
What's Your Perception Strategy? (Why It's NOT All About Content)Stephen Anderson
If we focus too much on content, we ignore what we know about how our associative brain comes to makes sense new information. Think about how many people respond before reading past the first sentence of an email, or how a magazine article doesn't get the same reaction when displayed in HTML. Or consider how knowing the author of a publication influences your judgement of that content.
Picking up from the session Stephen P. Anderson gave last year on "The Stories We Construct" (a biological look at the narratives that influence behavior), this session focuses on how we come to perceive—and respond to— information. From phantom limbs to magicians fooling our senses, Stephen proposes a model that makes sense of how we truly experience information. Practical? You'll leave with a deep understanding of everything UX is about and an awareness of common practices that don't account for this knowledge.
Оптимизация контекстной и тизерной рекламы на крупных аккаунтахRoman.ua
Презентация с конференции Контекстная реклама 2013
http://roma.net.ua
Тезисы:
1. Использование Google Docs, скриптов, если нету API. Импорт данных с сайта. Работа с dashboards.
2. Как с помощью сводной таблицы и 15 минут можно сэкономить 8000 грн.
3. Быстрые ответы на вопросы — что отключать, а что масштабировать.
Нишевый магазин и 94% клиентоориентированностиRoman.ua
Выступление с конференции OWOX 2013
http://roma.net.ua
Тезисы:
Нишевый магазин и 93% клиентоориентированности, как мы этого добиваемся?
— Разные механики для сбора обратной связи: тайный покупатель, опросы, Net Promoter Score, прослушивание звонков кол-центра, мониторинг упоминаний.
— Инструменты и подходы. 32% отклик на опросы длительностью 10 минут — как?
— Решение конфликтных ситуаций. Использование методичек Apple, эмпатия и скорость реакции.
— Как собрать жалобы с Клиентов у себя, а похвалы на внешних площадках?
Другие материалы по контекстной рекламе и веб-аналитике http://roma.net.ua/baza-znanij/
Плата за показы (CPM), плата за клик (CPC), плата за заказ (CPO), кликабельность рекламы (CTR).
Как правильно использовате все эти цифры, чтобы делать контекстную рекламу более эффективной. Аналитика Google Adwords и Яндекс.Директ.
Смотрите презентацию Романа Рыбальченко.
Результативная контекстная реклама: как контролировать, оптимизировать.Roman.ua
Как проводить регулярный аудит своей контекстной рекламы: Google Analytics, сводные отчеты в Google Docs
Как проверять качество своей контекстной рекламы: важные метрики, отчеты в GA.
Как масштабировать контекстную рекламу: быстрое создание кампаний, фишки при работе с Excel и Adwords editor, автоматизация объявлений и ключевых слов.
Чек лист: какие 15 вещей нужно проверить в своих кампаниях?
– Что мешает PPC специалисту растить проект?
– Какие ложные концепции снижают эффективность?
– Как выбрать инструменты и механики, которые будут соответствовать размеру проекта и бюджетов?
– Как перестать прокрастинировать и оптимизировать аккаунт быстро?
Brief overview of community conversations about use & abuse of design patterns.
Presented at the Agile Experience Design Meetup: SpooOOOoooky Dark Design Patterns for Agile UX
October 2015
Transitioning The Week Magazine’s Reading Experience from Print to iPad.Harry Brignull
The Week is the UK’s most popular weekly subscription magazine, with over 180,000 subscribers. It was started back in the mid ‘90s as an antidote to the feeling of “too much information” that readers got from all the unwieldy, dense broadsheets on the market at the time. Since then the World Wide Web appeared, sending many print publications into a downward spiral. The Week is one of the few publications to buck this trend – actually growing in popularity every consecutive year since its launch.
Dennis Publishing knew they had a winning formula for The Week magazine, and they wanted to be certain that none of the magic was lost in translation when they created the iPad edition. This is where we came in – kicking off a project with numerous UX research and design iterations. This talk will give you some insights into the challenges we faced and the lessons we learned in the process.
Dark patterns - An Overview for Brand OwnersHarry Brignull
This talk was given at the Madgex Innovations Event (December 2010) at the Soho hotel in London.
It’s a revised version of the original Dark Patterns talk given at UX Brighton 2010, containing a fair amount of new material, and a different intended audience: this talk is aimed at marketers and brand owners.
What You Need To Know About Eye Tracking (older barcamp version)Harry Brignull
You are viewing an OLD VERSION of this talk. There is a new, improved version of this talk here:
http://j.mp/eye-tracking-uxlx
---------
When you see an Eye Tracking heatmap for the first time, you are probably so busy saying “wow!” that you forget to critically evaluate what you are seeing.
This talk is intended to prevent this from happening - and give you a set of critical questions to ask next time you are faced with Eye Tracking findings.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.