This document discusses securing enterprise networks against threats. It notes that digital transformation is disrupting businesses and video traffic will grow significantly. New network priorities include wireless connectivity, intelligent WAN, cloud, and security everywhere. Network threats are getting smarter using techniques like advanced persistent threats. Cisco's solution leverages the network as a sensor and enforcer using technologies like Flexible NetFlow, Lancope StealthWatch, Cisco TrustSec and Cisco ISE for deep visibility and strong defense against network threats.
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
Sourcefire and Net Optics have partnered to provide a scalable and fault-tolerant solution, which consists of the Sourcefire NGIPS, working with Net Optics iBypassTM and xBalancerTM. This solution lets customers maintain their security and performance while preventing network downtime. http://www.netoptics.com
Cybersecurity and continuous intelligenceNISIInstituut
Welcome to the cybersecurity & continuous intelligence knowledge slidedeck of NISI (Nederlands Instituut voor de Software Industrie).
Cybersecurity & Continuous Intelligence is a broad topic, covering rules & regulation, internet, cyberwar, software, machine learning and society & trust.
This slidedeck offers you a more in-depth view of this exciting area.
Please contact us directly for more information via email info@nisi.nl or the contact on form on nisi.nl.
Nederlands Instituut voor de Software Industrie
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
Sourcefire and Net Optics have partnered to provide a scalable and fault-tolerant solution, which consists of the Sourcefire NGIPS, working with Net Optics iBypassTM and xBalancerTM. This solution lets customers maintain their security and performance while preventing network downtime. http://www.netoptics.com
Cybersecurity and continuous intelligenceNISIInstituut
Welcome to the cybersecurity & continuous intelligence knowledge slidedeck of NISI (Nederlands Instituut voor de Software Industrie).
Cybersecurity & Continuous Intelligence is a broad topic, covering rules & regulation, internet, cyberwar, software, machine learning and society & trust.
This slidedeck offers you a more in-depth view of this exciting area.
Please contact us directly for more information via email info@nisi.nl or the contact on form on nisi.nl.
Nederlands Instituut voor de Software Industrie
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
5G will mark the transition to an entirely new era in connectivity. It will link together critical infrastructure elements, making security an absolute imperative. This comes as no surprise — regulators have been enhancing their control over telecom security for some time already, as seen in the UK and Europe. We believe that this growth in regulative powers is part of a global tendency — one that is forcing change on all MNOs with regards to network security.
Our webinar covers:
- Types of threats in the 5G standalone core that you should be aware of (based on our exclusive research)
- Building appropriate guidelines to maintain reliability and resilience
- Reinforcing security strategy as a new global tendency in telecommunications, including an overview of recent changes to legislation in the UK and Europe
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
Top 7 Security Measures for IoT Systems Zoe Gilbert
Since, IoT systems of interrelated computing devices, mechanical or digital machines, which enables data transfer over a network without requiring human to human or human to computer interaction. So these are top 7 security measures which are most effective in order to enhance productivity for delivering better customer experience by minimizing the operational costs.
Palo Alto Networks ™ é a empresa de segurança de rede. Seus firewalls de próxima geração permitem visibilidade sem precedentes e controle de políticas granulares de aplicativos e conteúdo – por usuário, não apenas o endereço IP- até 20Gbps sem degradação do desempenho.
Com base na tecnologia App-ID ™, os firewalls da Palo Alto Networks ™ identificam com precisão e controlam os aplicativos – independentemente da porta, protocolo, evasiva tática ou criptografia SSL – e conteúdo de varredura para bloquear ameaças e evitar o vazamento de dados.
Empresas podem, pela primeira vez, abraçar a Web 2.0 e manter a visibilidade completa e controle, reduzindo significativamente o custo total de propriedade por meio da consolidação de dispositivos. Mais recentemente, os firewalls da Palo Alto Networks ™ tem permitido à empresas estenderem essa mesma segurança de rede para os usuários remotos com o lançamento do GlobalProtect ™ e para combater malwares modernos direcionados com seu serviço
WildFire ™. Veja mais em www.paloaltonetworks.com.
The security of data in transit has traditionally been the purview of nation states. Now the global adoption of the world wide web is bringing cryptography to the common man. But the forces of malicious actors and eavesdroppers are moving nearly all significant speech and commerce into a single cryptographic protocol: SSL.
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between an eavesdropper and a target, or a thief and a merchant. The stakes around SSL have been upleveled to the limit. Whether or not it’s convenient to admit, it’s time for organizations to uplevel their overall security posture to protect this last line of defense.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Download the full Midyear Security Report >> http://cs.co/MSR15SL
Cisco has released its Midyear Security Report. In this report, Cisco provides industry insights and key findings taken from threat intelligence and cybersecurity trends for the first half of 2015.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Como funcionários, ex-funcionários e terceiros podem comprometer a segurança na rede de uma empresa?
Palestra apresentada na 8ª Fatecnologia, Fatec de São Caetano, no dia 12/05/2016
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
5G will mark the transition to an entirely new era in connectivity. It will link together critical infrastructure elements, making security an absolute imperative. This comes as no surprise — regulators have been enhancing their control over telecom security for some time already, as seen in the UK and Europe. We believe that this growth in regulative powers is part of a global tendency — one that is forcing change on all MNOs with regards to network security.
Our webinar covers:
- Types of threats in the 5G standalone core that you should be aware of (based on our exclusive research)
- Building appropriate guidelines to maintain reliability and resilience
- Reinforcing security strategy as a new global tendency in telecommunications, including an overview of recent changes to legislation in the UK and Europe
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
Top 7 Security Measures for IoT Systems Zoe Gilbert
Since, IoT systems of interrelated computing devices, mechanical or digital machines, which enables data transfer over a network without requiring human to human or human to computer interaction. So these are top 7 security measures which are most effective in order to enhance productivity for delivering better customer experience by minimizing the operational costs.
Palo Alto Networks ™ é a empresa de segurança de rede. Seus firewalls de próxima geração permitem visibilidade sem precedentes e controle de políticas granulares de aplicativos e conteúdo – por usuário, não apenas o endereço IP- até 20Gbps sem degradação do desempenho.
Com base na tecnologia App-ID ™, os firewalls da Palo Alto Networks ™ identificam com precisão e controlam os aplicativos – independentemente da porta, protocolo, evasiva tática ou criptografia SSL – e conteúdo de varredura para bloquear ameaças e evitar o vazamento de dados.
Empresas podem, pela primeira vez, abraçar a Web 2.0 e manter a visibilidade completa e controle, reduzindo significativamente o custo total de propriedade por meio da consolidação de dispositivos. Mais recentemente, os firewalls da Palo Alto Networks ™ tem permitido à empresas estenderem essa mesma segurança de rede para os usuários remotos com o lançamento do GlobalProtect ™ e para combater malwares modernos direcionados com seu serviço
WildFire ™. Veja mais em www.paloaltonetworks.com.
The security of data in transit has traditionally been the purview of nation states. Now the global adoption of the world wide web is bringing cryptography to the common man. But the forces of malicious actors and eavesdroppers are moving nearly all significant speech and commerce into a single cryptographic protocol: SSL.
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between an eavesdropper and a target, or a thief and a merchant. The stakes around SSL have been upleveled to the limit. Whether or not it’s convenient to admit, it’s time for organizations to uplevel their overall security posture to protect this last line of defense.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Download the full Midyear Security Report >> http://cs.co/MSR15SL
Cisco has released its Midyear Security Report. In this report, Cisco provides industry insights and key findings taken from threat intelligence and cybersecurity trends for the first half of 2015.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Como funcionários, ex-funcionários e terceiros podem comprometer a segurança na rede de uma empresa?
Palestra apresentada na 8ª Fatecnologia, Fatec de São Caetano, no dia 12/05/2016
Whatscorp. Aplicativo de mensagens para Empresas e OrganizaçõesPablo Labbe
Whatscorp é um aplicativo de mensagens criado para uso por empresas, organizações que permite a convergência da comunicação digital para dispositivos móveis com total controle e privacidade pois ele pode ser hospedado na sua infraestrutura.
Neste PPT você tem todo o conteúdo apresentado na minha palestra sobre Segurança em Plataforma Microsoft para o evento do grupo ARQENGTI no dia 16/12/2016
Panorama de Segurança na Internet das CoisasSpark Security
Palestra ministrada no Workshop de Segurança da Telefônica em Novembro de 2015 sobre a revolução das "coisas" e os riscos de segurança que acompanham esse novo ecossistema de redes e dispositivos.
Seguindo as tendências da evolução tecnológica e com o advento da internet das coisas (Internet of Things – IoT), que potencializa o grande crescimento exponencial da quantidade de dispositivos que terão a necessidade de estar conectados, será inevitável o congestionamento nas redes atuais devido a novas funcionalidades e aplicações com o foco em serviços. De acordo com levantamentos iniciais realizados por agências especializadas [1][6] estima-se que em pouco tempo haverá bilhões ou trilhões de dispositivos conectados, o que demandará uma reestruturação profunda das redes atuais. Será que a rede atual conseguirá suportar toda esta demanda? Como será realizada a identificação destes novos dispositivos? E se estes dispositivos possuírem características diferentes? Como gerenciar sua mobilidade? Qual o tempo de resposta esperado para se manter um bom nível de serviço? Estas e outras colocações motivaram a abordagem do tema utilizado neste artigo, apresentando propostas de novas arquiteturas que visam contemplar os principais desafios de uma nova internet que seja focada em serviço e informação, e não mais em equipamentos, possibilitando a escalabilidade necessária para atender este novo cenário.
A Internet é, sem dúvida algo de muito positivo, uma vez que nos abre as portas da informação global, porém existem alguns perigos. Por todas estas razões convém que os usuários desta rede estejam informados e orientados na sua "navegação" e que, na medida do possível, aprendam algumas regras de segurança.
Recentemente o assunto franquia de dados para acesso a internet veio a tona. O momento e convergência tecnologia e não vejo com bons olhos a opção por franquia. O cenário rede + tipo de serviço, vejo como sendo o melhor modelo em se garantir a rentabilidade do negócio sem punir o usuário.
Resposta a Incidentes de Segurança com ferramentas SIEMSpark Security
Conheça alguns dos desafios atuais da segurança da informação, os conceitos por trás de uma ferramenta SIEM e como ela pode apoiar a resposta a incidentes de segurança.
Your network holds the key to defending your organization. The Cisco switches, routers, and wireless solutions you deploy can complement and empower your security systems. Cisco provides a broad portfolio of capabilities to improve your defenses across the entire attack continuum. This presentation outlines how you can use your network as a sensor to protect your data, your customers, and your reputation.
Register to Watch Webcast: http://cs.co/9003CRsH
Join the Conversation: http://cs.co/9008CRt6
How Converged Access and Application Intelligence Let You Handle Complex Network Needs for Visibility, Protection and Productivity. Customers around the world frequently describe to me their visions of the arriving IT environment—an ecosystem that’s open, flexible, scalable and robust; that lets companies enhance their application intelligence, fortify security, and seize fast-arising business opportunities.
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
Tempered Networks' presentation at the recent Rockwell Automation Fair 2016 helps viewers understand why it's so challenging and complex to connect and secure industrial IoT and SCADA systems. The future of networking and security must be based on 'host identity' not spoofable IP addresses.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
Gartner recently released a report on IT security priorities for the remainder of 2014. Amongst respondents, network security, application security, endpoint security, and security services all ranked highly. In this quick-fire, half-day roadshow, Scalar brings you solutions to these problems from three of our most strategic security vendors, as well as a full presentation on our managed security services portfolio.
The numbers are shocking: 69% of enterprise security executives report having experienced insider threats over one year. At the same time, 62% of business users report having access to data they should not see. Making matters worse? 43% of business say it takes at least a month (if not longer) to detect employees viewing files and emails they’re not authorized to access.*
With its comprehensive suite of flexible, simple, efficient solutions, Cisco Security offers a seamless approach designed to ease the burden on your IT team while strengthening your security posture. That includes Cisco Stealthwatch, a network visibility and security analytics system. Using NetFlow, Stealthwatch helps you use your network as a security sensor and enforcer to detect and remediate attacks, ultimately improving your threat defense—including time to detection and response.
Today, nearly a third of organizations lack the ability to prevent or deter insider threats.* Don’t let your agency be one of them.
Nowadays, your users are the primary attack vector, since they are not only sitting in the office, but they also carry mobile devices that are always on and almost always connected to the Internet.
So, besides protecting your datacenter, you need to protect your users wherever they are and whenever they connect to the Internet and/or to your corporate network.
zScaler, as a SaaS (Security-as-a-Service) platform, enables you to provide such protection, as well streamline your network connectivity.
Revista Cisco Live, a revista mais tecnológica de todas. Fique por dentro das tendências do mundo de TI e das opiniões de profissionais de diversos setores.
Como empresas investem em tecnologia e iniciam a jornada da transformação digital, com melhor atendimento ao cliente, mobilidade no espaço de trabalho, conectividade, segurança e sistemas digitais.
VAREJO – Rede Aliansce usa WiFi para estimular consumo em shoppings
SEGURANÇA – Cisco incorpora CloudLock e amplia portfólio de proteção às corporações
MERCADO – Setor de Óleo & Gás pode usar novas tecnologias para aumentar eficiência
Nova plataforma funciona como uma máquina do tempo para o data center, permitindo que as empresas possam analisar o que aconteceu, acompanhar o que está acontecendo em tempo real e mapear o que pode acontecer.
A Tetration visa atender operações críticas dos data centers, tais como o cumprimento das políticas, aplicação de análise forense e mudança para um modelo de segurança com atribuição de permissões. Por meio de monitoramento contínuo, análise e elaboração de relatórios, a plataforma Tetration Analytics oferece aos gestores de tecnologia uma compreensão mais aprofundada sobre o data center, capaz de simplificar drasticamente a confiabilidade operacional, operações do modelo de segurança “Zero Trust” e migrações de aplicativos para soluções definidas por software (SDN) e para a nuvem.
Em 2015, Cisco assumiu a liderança do mercado de servidores blade na America Latina, com 29,46% de market share e crescimento anual de 6,75%, segundo a IDC.
Às vezes, todos nós precisamos de um guia.
Algo que nos leve de onde estamos para onde queremos chegar. Nada mais justo. Se existem guias para a exploração de mundos de jogos, deveríamos também ter um guia que mostre como atingir o objetivo da transformação da rede.
Nós concordamos.
A transformação digital com a internet de todas as coisasCisco do Brasil
Casos de Sucesso de clientes.
Agora o termo “digital” está por toda parte – transformação digital, empresa digital e digitalização são os principais tópicos em quase todas as discussões sobre tecnologia e negócios. Embora atualmente muitos estejam definindo o que significa ser digital, poucas pessoas definiram como os mercados, as cidades e os países estão se tornando digitais.
A Cisco e os nossos parceiros têm trabalhado com clientes inovadores em todo o mundo para ajudá-los a se tornarem digitais. Estamos criando e implementando roadmaps digitais e transformações nos mercados, desde a produção até varejo e governo. Ajudamos países a transformarem a experiência dos cidadãos, bancos a reinventarem a experiência do cliente e provedores de energia a serem mais eficientes. E já estamos em ação.
Nós o convidamos a ler as histórias de empresas inovadoras que estão usando a Internet de Todas as Coisas para se tornarem digitais. Elas estão transformando a tecnologia em resultados comerciais e promovendo mudanças reais na forma como trabalhamos, vivemos, nos divertimos e aprendemos.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
A rede como um sensor de segurança
1. Enterprise
Networks
Security
Leverage
the
Network
to
Protect
Against
and
Mi;gate
Threats
Fernando Lucato / Heitor Silva
Business Development – Enterprise Networks LATAM
2. • Industry
trends
and
business
drivers
• Enterprise
Networks
priori;es
and
focus
areas
• Securing
Enterprise
Networks
• Products
within
the
solu;on
• Use
cases
• Demo
• Q&A
Agenda
4. 852%
Revenue
Growth
2005
to
2013
Bookstore
Taxi
Music
Newspaper
Point-‐of-‐Sale
200
Ci;es
45
Countries
40
Million
Subscribers
$30B
Forecasted
Transac;ons
in
2014
31%
of
WW
Digital
Ad
Revenue
Digi;za;on
disrup;ng
well
established
businesses
The
digital
businesses
are
disrup;ng
the
market
5. 0
2
4
6
8
10
12
14
2014 2015 2016 2017 2018 2019
Gaming (0.03% , 0.05% )
File Sharing (16.0% , 5.2% )
Web/Data (23.2% , 13.2% )
IP VoD (6.0% , 10.3% )
Internet Video (54.8% , 71.2% )
Video
traffic
growth
(La;n
America)
By
2019,
IP
Video
will
represent
82%
of
traffic
Source:
Cisco
VNI
Global
IP
Traffic
Forecast,
2014–2019
25%
CAGR
2014–2019
Exabytes
per
Month
*
Figures
(n)
refer
to
2014,
2019
traffic
shares
6. SD
2
Mbps
HD
7.2
Mbps
UHD
18
Mbps
10
33
77
146
245
371
0
50
100
150
200
250
300
350
400
2014 2015 2016 2017 2018 2019
Connetced
4Ks
TVs
(M)
Source:
Cisco
VNI
Global
IP
Traffic
Forecast,
2014–2019
Video
defini;on
increment
By2019,
more
than
31%
of
the
connected
TVs
will
be
4K
7. And
speed
is
an
obsession
for
networks
users…
68%
of
all
broadband
access
by
2019
Online
Video
(HD
movie
download)
22
minutes
(UHD
movie
download)
2
hours
10
Mbps
33%
of
all
broadband
access
by
2019
Online
Video
(HD
movie
download)
9
minutes
(UHD
movie
download)
48
minutes
25
Mbps
7%
of
all
broadband
access
by
2019
Online
Video
(HD
movie
download)
2
minutes
(UHD
movie
download)
12
minutes
100
Mbps
12. Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
New
Networks
Mean
New
Security
Challenges
Organizations lack visibility
into which and how many
devices are on their Network
Services are moving to the
Cloud at a faster rate than IT
can keep up
Over 50 billion connected
“smart objects” by 2020.
Acquisitions, joint ventures,
and partnerships are
increasing in regularity.
ENTERPRISE
MOBILITY
ACQUISITIONS AND
PARTNERSHIPS
CLOUD
INTERNET OF
THINGS
It’s
Not
“IF”
You
Will
Be
Breached…It’s
“WHEN.”
Expanded
Enterprise
Acack
Surface
13. Network
Threats
Are
Gedng
Smarter
1990
2020
2015
2010
2005
2000
1995
Phishing,
Low
Sophis;ca;on
Hacking
Becomes
an
Industry
Sophis;cated
Acacks,
Complex
Landscape
Viruses
1990–2000
Worms
2000–2005
Spyware
and
Rootkits
2005–Today
APTs
Cyberware
Today
+
Criminals
Know
More
About
Your
Network
Than
You
Do
Custom
Malware
Remains
Dormant
for
Months
to
Learn
Vulnerabili;es
in
the
Network
and
then
Acack
those
Vulnerabili;es.
16. Cisco’s
Threat-‐Centric
Approach
to
Security
BEFORE AFTERDURING
Network as a Sensor
Flexible
NetFlow
u
Lancope
StealthWatch
u
ISE
Network as an Enforcer
Flexible
NetFlow
u
Lancope
StealthWatch
u Cisco TrustSec u ISE
17. Cisco
Network
as
a
Sensor
(NaaS)
Detect
Anomalous
Traffic
Flows,
Malware
IdenTfy
User
Access
Policy
ViolaTons
Obtain
Broad
Visibility
into
All
Network
Traffic
18. Cisco
Network
as
an
Enforcer
(NaaE)
Implement
Access
Controls
to
Secure
Resources
Contain
the
Scope
of
an
Aeack
on
the
Network
QuaranTne
Threats,
Reduce
Time-‐to-‐RemediaTon
19. Network
as
a
Sensor
(NaaS)
Ø Cisco
Networking
Porlolio
Ø Cisco
NetFlow
Ø Lancope
StealthWatch
Ø Cisco
Iden;ty
Services
Engine
(ISE)
Deeper
Visibility
and
Greater
Defense
against
Network
Threats
Network
as
an
Enforcer
(NaaE)
Ø Cisco
Networking
Porlolio
Ø Cisco
NetFlow
Ø Lancope
StealthWatch
Ø Cisco
Iden;ty
Services
Engine
(ISE)
Ø Cisco
TrustSec
Somware-‐Defined
Segmenta;on
20. NetFlow
for
Dynamic
Network
Awareness
Understand
Network
Behavior
and
Establish
a
Network’s
Normal
Network Flows Highlight Attack Signatures
A
Powerful
InformaTon
Source
for
Every
Network
ConversaTon
Each
and
Every
Network
Conversa;on
over
an
Extended
Period
of
Time
Source
and
Des;na;on
IP
Address,
IP
Ports,
Time,
Data
Transferred,
and
More
Stored
for
Future
Analysis
A
CriTcal
Tool
to
IdenTfy
a
Security
Breach
Iden;fy
Anomalous
Ac;vity
Reconstruct
the
Sequence
of
Events
Forensic
Evidence
and
Regulatory
Compliance
NetFlow
for
Full
Details,
NetFlow-‐Lite
for
1/n
Samples
21. Lancope
StealthWatch
System
Network
Reconnaissance
Using
Dynamic
NetFlow
Analysis
Monitor
Detect
Analyze
Respond
Ø Understand
your
network
normal
Ø Gain
real-‐;me
situa;onal
awareness
of
all
traffic
Ø Leverage
Network
Behavior
Anomaly
detec;on
&
analy;cs
Ø Detect
behaviors
linked
to
APTs,
insider
threats,
DDoS,
and
malware
Ø Collect
&
Analyze
holis;c
network
audit
trails
Ø Achieve
faster
root
cause
analysis
to
conduct
thorough
forensic
inves;ga;ons
Ø Accelerate
network
troubleshoo;ng
&
threat
mi;ga;on
Ø Respond
quickly
to
threats
by
taking
ac;on
to
quaran;ne
through
Cisco
ISE
22. Cisco
Iden;ty
Services
Engine
(ISE)
Adding
Visibility
and
Context
to
NetFlow
INTEGRATED
PARTNER CONTEXT
NETWORK / USER
CONTEXT
How
WhatWho
WhereWhen
SEND
CONTEXTUAL
DATA
COLLECTED
FROM
USERS,
DEVICES,
AND
NETWORKS
TO
LANCOPE
FOR
ADVANCED
INSIGHTS
AND
NETFLOW
ANALYTICS
23. What
Can
Cisco
NaaS
and
NaaE
Offer
You?
Consistent
Control
Complexity
ReducTon
Consistent
Policies
Across
the
Network
and
Data
Center
Fits
and
Adapts
to
Changing
Business
Models
Global
Intelligence
With
the
Right
Context
Detects
and
Stops
Advanced
Threats
Advanced
Threat
ProtecTon
Unmatched
Visibility
24. Network
as
a
Sensor/Network
as
an
Enforcer
Use
Cases
25. Customer
Case
Study
-‐
Network
as
a
Sensor
Industry:
Retail
Company:
Large
Known
Global
Retailer
Exis2ng
Environment:
• Large
Cisco
Switch
&
Router
Footprint
• ASA
&
ISE
Customer
Challenges:
• Limited
visibility
&
intelligence
across
their
highly-‐distributed
retail
footprint
• Lack
of
ability
to
correlate
numerous
data
sets
Results:
• Amer
deploying
Cisco
Nellow,
Lancope
Stealth
Watch
and
Cisco
ISE
• Gains
Retail
Point-‐of-‐Presence
Visibility
• Deeper
Understanding
into
Network
Applica;on
Usage
26. Customer
Case
Study
-‐
Network
as
an
Enforcer
Industry:
Banking
Company:
Large
Known
Global
Bank
Exis2ng
Environment:
• Large
Cisco
Switch
&
Router
Footprint
Customer
Challenges:
• Visibility
into
the
network
and
rogue
devices
• Policy
enforcement
of
user
to
data
center
policies
• Mee;ng
compliance
audits
Results:
• Amer
deploying
Lancope
Stealth
Watch
Cisco
ISE
and
Cisco
TrustSec
• Gain
Deep
Visibility
into
Network
Access
and
Devices
• Segment
Network
Access
and
Assets
using
Business
Role
Based
Policies
• Accelerated
;me
to
Compliance
Audits
28. Behavioral
Analysis
• Leverages
knowledge
of
known
bad
behaviour
Anomaly
DetecTon
• Iden;fy
a
change
from
“normal”
Behavioral
Analysis
&
Anomaly
Detec;on
29. Solu;on
Architecture
StealthWatch
Management
Console
UDP
Director
FlowCollector
NetFlow,
syslog,
SNMP
NetFlow
enabled
infrastructure
FlowSensor
VMware
ESX
with
FlowSensor
VE
User
and
Device
Informa;on
StealthWatch
IDen;ty
Cisco
ISE
Feeds
of
emerging
threat
informa;on
Unified View:
Security and Network
Monitoring
30. NaaS:
Powered
by
StealthWatch
Denial
of
Service
SYN
Half
Open;
ICMP/UDP/Port
Flood
Worm
PropagaTon
Worm
Infected
Host
Scans
and
Connects
to
the
Same
Port
Across
MulTple
Subnets,
Other
Hosts
Imitate
the
Same
Above
Behavior
FragmentaTon
Aeack
Host
Sending
Abnormal
#
Malformed
Fragments.
Botnet
DetecTon
When
Inside
Host
Talks
to
Outside
C&C
Server
for
an
Extended
Period
of
Time
Host
ReputaTon
Change
Inside
Host
PotenTally
Compromised
or
Received
Abnormal
Scans
or
Other
Malicious
Aeacks
Network
Scanning
TCP,
UDP,
Port
Scanning
Across
MulTple
Hosts
Data
ExfiltraTon
Large
Outbound
File
Transfer
VS.
Baseline
31. Policy
Defined
Role-‐Based
Segmenta;on
Flexible
and
Scalable
Policy
Enforcement
Switch
Router
DC
FW
DC
Switch
Simplified
Access
Management
Accelerated
Security
Opera;ons
Consistent
Policy
Anywhere
Who
can
talk
to
whom
Who
can
access
protected
assets
How
systems
can
talk
to
other
systems
Desired
Policy
NaaE:
Segmenta;on
via
TrustSec
32. StealthWatch
Capabili;es
Summary
Visibility
• Context-‐aware
visibility
into
network,
applica;on
and
user
ac;vity
• BYOD
• Cloud
monitoring
• IPv6
• East-‐West
Traffic
monitoring
• Network
segmenta;on
Threat
DetecTon
• Advanced
Persistent
Threats
• Botnet
(CnC)
Detec;on
• Data
Exfiltra;on
• Network
Reconnaissance
• Insider
Threat
• DDoS
• Malware
• Network
Behavior
Anomaly
Detec;on
• SLIC
threat
feed
Incident
Response
• In-‐depth,
flow-‐
based
forensic
analysis
of
suspicious
incidents
• Scalable
repository
of
security
informa;on
• Retrace
the
step-‐by-‐
step
ac;ons
of
a
poten;al
acacker
• On-‐demand
packet
capture
Network
DiagnosTcs
• Applica;on
Awareness
• Capacity
Planning
• Performance
Monitoring
• Troubleshoo;ng
User
Monitoring
• Cisco
ISE
• Monitor
privileged
access
• Policy
enforcement
35. TradiTonal
Security
Policy
Cisco
TrustSec
Somware-‐Defined
Segmenta;on
Provide
Role-‐Based
Segmenta;on
to
Control
Access
and
Contain
Threats
TrustSec
Security
Policy
SegmentaTon
Policy
Enforced
Across
the
Extended
Network
Switch
Router
VPN
&
Firewall
DC
Switch
Wireless
Controller
Simplifies
Firewall
Rule,
ACL,
VLAN
Management
Prevents
Lateral
Movement
of
Poten;al
Threats
Eliminates
Costly
Network
Re-‐architecture
36. Segmenta;on
is
Powerful
Security
Tool
“Network segmentation… is one of the most effective
controls an agency can implement to mitigate the second
stage of a network intrusion, propagation or lateral
movement”
“Good network and role segmentation will do wonders for
containing an incident.”
“Effective network segmentation… reduces the extent to
which an adversary can move across the network”
“Segregate networks, limit allowed protocols usage and limit
users’ excessive privileges.”
2014 DATA BREACH
INVESTIVATIONS REPORT
The Untold Story of the Target Attack
Step by Step
Aortato Labs, August 2014
37. Bringing
It
All
Together
Architec;ng
Network
as
a
Sensor
and
Network
as
an
Enforcer
Network Sensor
(Lancope)
NGFW
Campus/DC
Switches/WLC
Cisco Routers /
3rd Vendor Devices
Threat
NGIPS
API
API (pxGrid)
ISE
Network Sensors Network Enforcers
Policy & Context
Sharing
TrustSec
Security Group Tag
Cisco Collective
Security Intelligence
Confidential
Data