SlideShare a Scribd company logo
Cloud Computing Security - Insights - Giorgia Caleffi Security Programs Manager A presentation for Computer Science Department Virginia Tech
Introduction
Some Cautions About Today's Talk/Topic ,[object Object],[object Object],[object Object],[object Object],[object Object]
What's Driving Cloud Computing? Drivers Include… ,[object Object],[object Object],[object Object]
 
Apps.Gov (Currently a Bit of A Work In Progress)
DISA's RACE
Our  Community Is  Also  Pressing Ahead ,[object Object],[object Object],[object Object],[object Object]
"Cyberinfrastructure Visualized:" A Cloud, With Lots of "Security" References
Why Is "Security" Everywhere on That Slide? ,[object Object],[object Object]
Source:  http://www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt at slide 17 Another Data Point for Clouds and Security
Cloud Computing Is Many Different  Things to Many Different People ,[object Object],[object Object]
Some Generally Accepted Characteristics ,[object Object],[object Object]
Some "Clouds" Won't Necessarily  Have All of Those Characteristics ,[object Object],[object Object]
 
Will  Your  Campus Offer Private Cloud Services? ,[object Object]
So What About  Security  in the Cloud ? For the remainder of this talk, we'll outline some of the security issues you might run into when using cloud computing
In Some Ways, "Cloud Computing Security" Is No Different Than "Regular Security" ,[object Object],[object Object]
There  Are  Some Unique Cloud-Related Areas Which We're NOT Going To Worry About Today ,[object Object],[object Object],[object Object]
The "A" in The Security "C-I-A" Objectives ,[object Object],[object Object],[object Object]
Bitbucket, DDoS'd Off The Air
Maintenance Induced Cascading Failures
It's Not Just The Network: Storage Is Key, Too See http://www.engadget.com/2009/10/10/t-mobile-we-probably-lost-all-your-sidekick-data/ However, see also: Microsoft Confirms Data Recovery for Sidekick Users http://www.microsoft.com/Presspass/press/2009/oct09/10-15sidekick.mspx
And Let's Not Forget About Power Issues
Mitigating Cloud Computing Availability Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Data Loss Risks ,[object Object],[object Object],[object Object]
Cloud Computing And Perimeter Security ,[object Object],[object Object],[object Object]
Cloud Computing & Host-Based Intrusion Detection ,[object Object],[object Object]
Cloud Computing Also Relies  on the Security of Virtualization ,[object Object],[object Object],[object Object]
Choice of Cloud Provider ,[object Object],[object Object]
Cloud Provider Location ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Provider Employees ,[object Object],[object Object]
Cloud Provider Transparency ,[object Object],[object Object],[object Object],[object Object]
An Example of The  Wrong  Approach Source: http://cloudsecurity.org/blog/2008/07/01/ cloudsecurityorg-interviews-guido-van-rossum-google-app-engine-python-and-security.html
Provider Failures Are Also A  Real  Possibility ,[object Object]
Pen Testing; Working Incidents In The Cloud ,[object Object],[object Object],[object Object]
OECD, The Cloud, and Privacy Cloud Computing and Public Policy, 14 October 2009 http://www.olis.oecd.org/olis/2009doc.nsf/ENGDATCORPLOOK/NT00004FC6/$FILE/JT03270509.PDF
World Privacy Forum Privacy In The Clouds Report From: "Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing," Released February 23, 2009, http://www.worldprivacyforum.org/cloudprivacy.html
Additional Cloud Computing Security Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks for The Chance To Talk Today! ,[object Object]

More Related Content

What's hot

Demystifying the cloud
Demystifying the cloudDemystifying the cloud
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
Cloud Legal Project
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Joel May
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?
Cartesian (formerly CSMG)
 
Briefing 47
Briefing 47Briefing 47
Cloud computing: how will it affect my everday work life?
Cloud computing: how will it affect my everday work life?Cloud computing: how will it affect my everday work life?
Cloud computing: how will it affect my everday work life?
Kosie Eloff
 
GeekSpeak: Cloud Computing
GeekSpeak: Cloud ComputingGeekSpeak: Cloud Computing
GeekSpeak: Cloud Computing
Dawn Quinn
 
Cloud computing secrets
Cloud computing secretsCloud computing secrets
Cloud computing secrets
Flora Runyenje
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?
HTS Hosting
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccap
William Mann
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
Cirro
 
Wissensmanagement 4.2
Wissensmanagement 4.2Wissensmanagement 4.2
Wissensmanagement 4.2
Karsten Ehms
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
The What, the Why and the How of Hybrid Cloud
The What, the Why and the How of Hybrid CloudThe What, the Why and the How of Hybrid Cloud
The What, the Why and the How of Hybrid Cloud
Hybrid Cloud
 
Lightning talks
Lightning talksLightning talks
Lightning talks
Skills Matter
 
Collaboration In The Cloud Presentation
Collaboration In The Cloud PresentationCollaboration In The Cloud Presentation
Collaboration In The Cloud Presentation
Patrick Huang
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver lining
Aditya Dashora
 

What's hot (18)

Demystifying the cloud
Demystifying the cloudDemystifying the cloud
Demystifying the cloud
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?
 
Briefing 47
Briefing 47Briefing 47
Briefing 47
 
Cloud computing: how will it affect my everday work life?
Cloud computing: how will it affect my everday work life?Cloud computing: how will it affect my everday work life?
Cloud computing: how will it affect my everday work life?
 
GeekSpeak: Cloud Computing
GeekSpeak: Cloud ComputingGeekSpeak: Cloud Computing
GeekSpeak: Cloud Computing
 
Cloud computing secrets
Cloud computing secretsCloud computing secrets
Cloud computing secrets
 
How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?How does Cloud Hosting help with Data Security?
How does Cloud Hosting help with Data Security?
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccap
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
Wissensmanagement 4.2
Wissensmanagement 4.2Wissensmanagement 4.2
Wissensmanagement 4.2
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
The What, the Why and the How of Hybrid Cloud
The What, the Why and the How of Hybrid CloudThe What, the Why and the How of Hybrid Cloud
The What, the Why and the How of Hybrid Cloud
 
Lightning talks
Lightning talksLightning talks
Lightning talks
 
Collaboration In The Cloud Presentation
Collaboration In The Cloud PresentationCollaboration In The Cloud Presentation
Collaboration In The Cloud Presentation
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver lining
 

Viewers also liked

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Piyush Mittal
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
Parveen Yadav
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Antonio Sanz Alcober
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
Abhishek Kumar Sinha
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Aung Thu Rha Hein
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
Symantec
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
Andy Piper
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
Michael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Reuven Lerner
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
WSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
Sun Digital, Inc.
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
CompTIA
 

Viewers also liked (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
 

Similar to Cloud computing security - Insights

cloud-computing-security.ppt
cloud-computing-security.pptcloud-computing-security.ppt
cloud-computing-security.ppt
SaravanaKarthikeyan10
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
Arjunsinh Sindhav
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
Custom Paper Services
 
Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
James Urquhart
 
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, moreCloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
Abaram Network Solutions
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
Lew Oleinick
 
IASA Atlanta September 2009
IASA Atlanta September 2009IASA Atlanta September 2009
IASA Atlanta September 2009
Christopher Curtin
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
ITpreneurs
 
Bar camp 2010
Bar camp 2010Bar camp 2010
Bar camp 2010
Matthias Jung
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
Faisal Shehzad
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
Prasanna Kumar Valluri
 
Cloud computing
Cloud computingCloud computing
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Kishor Satpathy
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
tntsa1972
 
Cloud Computing Presentation_Web Tools_Nicole Siegel
Cloud Computing Presentation_Web Tools_Nicole SiegelCloud Computing Presentation_Web Tools_Nicole Siegel
Cloud Computing Presentation_Web Tools_Nicole Siegel
nsiegel922
 
Introduction_-_To-_-SRE
Introduction_-_To-_-SREIntroduction_-_To-_-SRE
Introduction_-_To-_-SRE
Chidiebube Amos
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
Eueung Mulyana
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
nsiegel922
 
Cloud Computing_Web Tools_5-19-10_Nicole Siegel
Cloud Computing_Web Tools_5-19-10_Nicole SiegelCloud Computing_Web Tools_5-19-10_Nicole Siegel
Cloud Computing_Web Tools_5-19-10_Nicole Siegel
nsiegel922
 

Similar to Cloud computing security - Insights (20)

cloud-computing-security.ppt
cloud-computing-security.pptcloud-computing-security.ppt
cloud-computing-security.ppt
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
 
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, moreCloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
IASA Atlanta September 2009
IASA Atlanta September 2009IASA Atlanta September 2009
IASA Atlanta September 2009
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Bar camp 2010
Bar camp 2010Bar camp 2010
Bar camp 2010
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Cloud Computing Presentation_Web Tools_Nicole Siegel
Cloud Computing Presentation_Web Tools_Nicole SiegelCloud Computing Presentation_Web Tools_Nicole Siegel
Cloud Computing Presentation_Web Tools_Nicole Siegel
 
Introduction_-_To-_-SRE
Introduction_-_To-_-SREIntroduction_-_To-_-SRE
Introduction_-_To-_-SRE
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
 
Cloud Computing_Web Tools_5-19-10_Nicole Siegel
Cloud Computing_Web Tools_5-19-10_Nicole SiegelCloud Computing_Web Tools_5-19-10_Nicole Siegel
Cloud Computing_Web Tools_5-19-10_Nicole Siegel
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Cloud computing security - Insights