Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
The world of security has changed dramatically in the past year. Those whose strategy reflects the reality of last year are losing ground to industry leaders who really “get it.'
This presentation explores how security leaders can lead the pack in the new application economy. We explore the new security reality, and show how leading firms are successfully re-inventing their security model.
See more at:: http://cainc.to/9XcG5W
On-premises web gateways are being disrupted, and the model of providing web content security is changing. The pace of technology change and evolving employee work habits are pushing on-premises gateways out of the picture. Many companies are outsourcing their Security to Managed Security Service Providers.
Zscaler is the only carrier-grade Security as a Service platform.
Zscaler serves large enterprises, governments & mid-sized organizations in 185+ countries.
Zscaler protects 13M+ users across 5,000+ clients.
Ομιλία – Παρουσίαση: Παναγιώτης Μαστρογιάννης, Manager, IT, Distributed Systems, New SIA Greece
Τίτλος παρουσίασης: «New SIA Greece Automates Data Movement and Distribution with IBM Watson Supply Chain MFT Solution»
Gemalto's Gary Marsden takes us through the hyper-developing world of 'Data Protection On Demand In Hybrid IT' and why companies need to change their behaviours to suit the customers.
Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
The world of security has changed dramatically in the past year. Those whose strategy reflects the reality of last year are losing ground to industry leaders who really “get it.'
This presentation explores how security leaders can lead the pack in the new application economy. We explore the new security reality, and show how leading firms are successfully re-inventing their security model.
See more at:: http://cainc.to/9XcG5W
On-premises web gateways are being disrupted, and the model of providing web content security is changing. The pace of technology change and evolving employee work habits are pushing on-premises gateways out of the picture. Many companies are outsourcing their Security to Managed Security Service Providers.
Zscaler is the only carrier-grade Security as a Service platform.
Zscaler serves large enterprises, governments & mid-sized organizations in 185+ countries.
Zscaler protects 13M+ users across 5,000+ clients.
Ομιλία – Παρουσίαση: Παναγιώτης Μαστρογιάννης, Manager, IT, Distributed Systems, New SIA Greece
Τίτλος παρουσίασης: «New SIA Greece Automates Data Movement and Distribution with IBM Watson Supply Chain MFT Solution»
Gemalto's Gary Marsden takes us through the hyper-developing world of 'Data Protection On Demand In Hybrid IT' and why companies need to change their behaviours to suit the customers.
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...apidays
apidays LIVE Paris 2021 - APIs and the Future of Software
December 7, 8 & 9, 2021
How password managers are built for Privacy and Security
Frederic Rivain, CTO at Dashlane
By introducing relevant improvements in technology, blockchain networks have fully changed our way of life. Blockchain radically changes the way we live life for a good cause in many ways.
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
Hackers can't hack what they can't see. Our invisibility cloak represents a whole new paradigm to infrastructure protection beyond Zero Trust by taking remote communications "off the grid" while preserving the existing infrastructure and development investments. NVIS is military-grade security built by the team that created a best-in-class unhackable solution approved for DoD-wide use and for Coalition forces. NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly, especially in the global threat climate.
Going Beyond the Cloud to Modernize Your Banking InfrastructureCloudflare
View this presentation to learn about digital transformation in banking and how Cloudflare can help. You will learn about:
-Common challenges banks are facing when migrating to the cloud;
-How to integrate your existing on-premise infrastructure alongside public facing workloads;
-Why global load balancers are an essential part of any multi-cloud strategy;
-What banks can do to support faster innovation across your organization;
-What banks should be aware of regarding compliance and monitoring
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
With Markus Weber, Sr. Manager, Product Marketing, ForgeRock.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. In this session, learn about the User-Managed-Access (UMA) standard, ForgeRock’s OpenUMA project and how ForgeRock is developing solutions to ensure privacy and trust in the digital world.
In a highly competitive digital culture, businesses are intensifying their digital transformation efforts to expand their hybrid and multi-cloud cloud initiatives. As dependencies on legacy point solutions and architectures begin to diminish, developers are becoming increasingly influential in newly digitally transformed organizations.
The need for increased agility, and speed is paramount. While CDNs have been a key fixture for many enterprise businesses to remediate global network latencies, new challenges have arisen with these solutions that are inhibiting agile workstyles.
Join this webinar to learn the following:
- The foundations of improving web performance
- How the web performance market is evolving and the challenges faced by CDN providers
- How Cloudflare supports your digital transformation
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Novel approaches in API security
Dr Tal Steinherz, CTO at Syber.ai
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Developing Trusted Networks with Salesforce BlockchainDeveloper Force
In this presentation you'll discover how Salesforce simplifies blockchain development with clicks and code, walk through use cases that benefit from Salesforce Blockchain and learn how to plan for Salesforce Blockchain in your roadmap.
Title: Overcoming today’s business challenges with a multi-product, open source approach.
Liferay is a leading open source software company that helps companies create digital experiences on the web, mobile and connected devices.
During this presentation, discover how Liferay ́s unified platform can help companies address today's key digital challenges. See how our open source approach empowers customers to create stunning websites, gather in-depth user analytics and to seamlessly sell online with a cloud-ready, integrated ecosystem.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...apidays
apidays LIVE Paris 2021 - APIs and the Future of Software
December 7, 8 & 9, 2021
How password managers are built for Privacy and Security
Frederic Rivain, CTO at Dashlane
By introducing relevant improvements in technology, blockchain networks have fully changed our way of life. Blockchain radically changes the way we live life for a good cause in many ways.
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
Hackers can't hack what they can't see. Our invisibility cloak represents a whole new paradigm to infrastructure protection beyond Zero Trust by taking remote communications "off the grid" while preserving the existing infrastructure and development investments. NVIS is military-grade security built by the team that created a best-in-class unhackable solution approved for DoD-wide use and for Coalition forces. NVIS is revolutionary in the security and privacy space to benefit B2B or B2G greatly, especially in the global threat climate.
Going Beyond the Cloud to Modernize Your Banking InfrastructureCloudflare
View this presentation to learn about digital transformation in banking and how Cloudflare can help. You will learn about:
-Common challenges banks are facing when migrating to the cloud;
-How to integrate your existing on-premise infrastructure alongside public facing workloads;
-Why global load balancers are an essential part of any multi-cloud strategy;
-What banks can do to support faster innovation across your organization;
-What banks should be aware of regarding compliance and monitoring
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
With Markus Weber, Sr. Manager, Product Marketing, ForgeRock.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. In this session, learn about the User-Managed-Access (UMA) standard, ForgeRock’s OpenUMA project and how ForgeRock is developing solutions to ensure privacy and trust in the digital world.
In a highly competitive digital culture, businesses are intensifying their digital transformation efforts to expand their hybrid and multi-cloud cloud initiatives. As dependencies on legacy point solutions and architectures begin to diminish, developers are becoming increasingly influential in newly digitally transformed organizations.
The need for increased agility, and speed is paramount. While CDNs have been a key fixture for many enterprise businesses to remediate global network latencies, new challenges have arisen with these solutions that are inhibiting agile workstyles.
Join this webinar to learn the following:
- The foundations of improving web performance
- How the web performance market is evolving and the challenges faced by CDN providers
- How Cloudflare supports your digital transformation
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Novel approaches in API security
Dr Tal Steinherz, CTO at Syber.ai
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Developing Trusted Networks with Salesforce BlockchainDeveloper Force
In this presentation you'll discover how Salesforce simplifies blockchain development with clicks and code, walk through use cases that benefit from Salesforce Blockchain and learn how to plan for Salesforce Blockchain in your roadmap.
Title: Overcoming today’s business challenges with a multi-product, open source approach.
Liferay is a leading open source software company that helps companies create digital experiences on the web, mobile and connected devices.
During this presentation, discover how Liferay ́s unified platform can help companies address today's key digital challenges. See how our open source approach empowers customers to create stunning websites, gather in-depth user analytics and to seamlessly sell online with a cloud-ready, integrated ecosystem.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
The control points that CISOs were responsible for have largely disappeared so innovative CISOs have to deploy a risk-based security approach. And CIOs must move from thinking of their data center as the corporate epicenter, and admit that the Internet is their new corporate network.
SoftLayer, an IBM Company, utilizes infrastructure which is fully customizable, with a single point of control, for flexible and powerful cloud options. It is one of the only providers who offer Bar Metal dedicated Cloud, and completely configurable Virtual Cloud (Public and Private) without any t-shirt sizing.
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Hello! VEBTECH team creates solutions that develop your business. 200+ certified developers with 25 years of experience in FinTech. We are strong in:
• Website, platform, and mobile application development
• BPM (PEGA, Zendesk)
• Blockchain solutions
• Cybersecurity (Red Team)
• IT - Monitoring
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
Dominique Singer will be hosted AppGate's RVP of Sales, Ken Harris, and National Channel Director, Tamara Prazak, where they discussed how there’s never been greater demand from your clients to secure work from home and remote access. Don’t miss this window of opportunity to help your clients replace their outdated VPNs with Software-Defined Perimeter (SDP) from the industry leading solution- AppGate SDP. Get more client meetings by using this as a wedge.
The rise of IT as Service (ITaaS) is result of the intense rate of change brought about by technologies such as cloud computing, social media, consumerization, mobility, analytics and big data. The pace of change is only increasing, and these emerging technologies need to be rapidly integrated into modern enterprise, almost in real-time. Enter ITaaS, on-demand. In its various forms, ITaaS on-demand solves the myriad problems of modern IT resource consumption. When technology is restructured to be flexible, fast and ready, capabilities are provided based on usage. Transitioning to an on-demand hybrid infrastructure is a complete transformation that can support your future business goals, help fuel business innovation and turn IT from a cost center to a value center. This is the future of IT, it will be hybrid, and it will be on-demand with utmost flexibility, scalability and cost-efficiency.
Albiorix Technology brings the top 10 digital transformation trends to watch out for in 2023 that you can adopt to improve your business performance.
For More Information: https://www.albiorixtech.com/blog/digital-transformation-trends/
Nearly every IT leader these days is wresting with Shadow IT – the dynamic in which end users obtain IT solutions from cloud service providers without informing corporate IT.
Secure, Strengthen, Automate, and Scale Modern Workloads with Red Hat & NGINXNGINX, Inc.
Learn how to support your application delivery – no matter where you are on the journey from monolithic apps to microservices.
Join this webinar to learn:
- About important considerations around digital innovation in FSI
- How to leverage automation and Ansible to deliver apps faster
- About keys to delivering modern apps securely and reliably anywhere
- How OpenShift takes the complexity out of containers
https://www.nginx.com/resources/webinars/secure-strengthen-automate-scale-modern-workloads-with-red-hat-nginx/
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
Cloud computing has emerged as an innovative and disruptive technology for government and industry.
In this presentation, Intelligo makes a business case for the implementation of Cloud technologies in businesses.
Extelligence has been delivering IT Services for over 10 years, working with some of the largest corporations around the the world, including but not limited to DHL, Novartis, T Mobile, Czech Public sector. With Experience of delivering data and security management systems. Despite our 10 years we still consider ourselves a young and flexible organization.
We make it easy for all the startups in USA. Be it hiring the expert or building the software, we do it all. With 10+ years of expertise we advise, we provide, we monitor, and support you at every step. Best price for software licensing and renewals are guaranteed. https://candid8.us/
E-commerce Seminar: 50 ways to increase your online salesScreen Pages
Roger Willcocks, director at Screen Pages, one of the leading e-commerce agencies, will share quick-fire e-commerce tips and advice to improve customer acquisition, engagement and retention that retailers can easily implement on their e-commerce websites based on experience working with 100s of niche retailers since 2000.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. WHO WE ARE
2Restricted & Confidential
We deliver
THAT DELIVER EXTRAORDINARY ADVANTAGE
FOR OUR CUSTOMERS
BUSINESS PLATFORMS
ImplementationInnovation Acceleration
Cloud
Solutions
Managed Hosting
Solutions
Colocation
Solutions
Security
Solutions
Managed IT
Solutions
FastFiber Network™
Solutions
3. 3
OPTIMISED MAGENTO STACK
UNLEASHING THE POWER OF MAGENTO
Cogeco Peer 1 services over Magento platform:
24x7 support
Incident Management
A Magento specialized customer on-boarding session
Access to the CogecoPeer1 knowledge base
Our basic monitoring package is included
Easy access to the sales engineering support teams
Patch management service
Magento Optimized Managed Hosting Platform includes:
Web Servers, Database Servers, Load Balancing, Firewalls, SSL Certificated, Advanced
Monitoring, Backups, Optimised OS Builds
4. With direct connections to the world’s largest networks, our
customers are just one hop away from their customers
OUR PEERING PARTNERS
4
PERFORMANCE NETWORK
Fewer hops mean that your traffic takes the shortest and
fastest route possible to your Customers, resulting in
lower latency of your traffic
If an upstream provider has an issue, your traffic is not
impacted as thousands of alternate routes are available.
BENEFITS TO YOU
6. OUR CUSTOMERS
6
“I'm a strong believer in a business focusing on its core
competencies well; our core competencies aren't keeping
servers running and having backups -- it's not where we can
operate, and putting resources into that doesn't make sense
at all," he says.
"It's much better to put resources that would have been
those things into improving our own offerings".
11. • Despite alarms over cyberattack in the last five years,
enterprise spending has been patchy, and actually declined
in 2014
• Enterprise pend is rotating as data and applications move to
the cloud, AV declines, cyber grows
• Organisations will avoid compliance and security spending if
they can
• Compliance fines are a cost of doing business
• Security industry relies on fear uncertainty and doubt
triggering widespread, well-deserved cynicism
• End-to-end encryption is highly successful as used in apps
like WhatsApp, even the CIA finds it hard to break
• Emerging technologies like Blockchain have major potential
SECURITY IS AT THE TOP OF EVERYONE’S AGENDA
11
12. • Website goes down, but no communication to customers for
24hours, outage attributed to unspecified technical problems
• Rumours circulate that 4mn accounts have been accessed
following a cyberattack, (the 3rd of the year for TalkTalk)
• TalkTalk admits data many have been compromised by
cyberattack, 24 hours after breach, email goes out 72 hours
after the attack telling customers passwords may have been
accessed
• CEO gets in front of media but appears not to know if data is
encrypted, says not obliged to decrypt legally
• TalkTalk messaging becomes increasingly incoherent,
attributes data loss to a DDOS attack, calls SQL injection
‘sequential’
• Tells customers attack ‘only’ 160,000 accounts were affected
(accessed by a 15 year old), even fewer had useful data
accessed, PAN numbers were semi-tokenized
A CASE STUDY IN HOW NOT TO HANDLE A BREACH
12
13. Can you work out the company from the slogan / corporate statement?
• ‘We offer reliable, scalable and inexpensive cloud computing services. Feel free to join, pay only for what you use’
• ‘We are a bare metal cloud built for developers offering Intel and ARMv8’
• ’Don’t be evil’
• ‘Be connected. Be discovered’
• ‘Life is more fun when you live in the moment’
• ‘Your margin is our opportunity’
• ‘Architect’s of what’s next’
• ‘Our mission and values are here to help people and businesses throughout the world realise their full potential’
• ‘Earth’s most customer-centric Company’
• ‘You have to see it to believe it’
THE ENGLISH LANGUAGE WON’T BITE BACK
13
‘The great enemy of clear language is
insincerity. When there is a gap
between one’s real and one’s
declared aims, one turns as it were
instinctively to long words and
exhausted idioms, like a cuttlefish
spurting out ink’ George Orwell
Voda 2,100 staffers bring call centres back
EE bringing back 1,000
BT hiring 1,500
Source for decline in 2014 PwC
Open web application security project
TalkTalk losing about a third of its value in the last month.
News is going to get worst – but mostly for management
Wikileaks That's actually a silver lining to all this: end-to-end encrypted apps, such as Signal and WhatsApp, are so strong, the CIA has to compromise your handset, TV or computer to read your messages and snoop on your webcam and microphones, if you're unlucky enough to be a target. Hacking devices this way is fraught with risk and cost, so only highly valuable targets will be attacked. The vast, vast majority of us are not walking around with CIA malware lurking in our pockets, laptop bags, and living rooms.
Qe
TalkTalk losing about a third of its value in the last month.
It now appears that the hack wasn’t as bad as first thought with ‘just’ 160K customers being affected. And even fewer had any useful data accessed.
But the way the whole situation has been handled – fronted by CEO Dido Harding – has made the situation much, much worse than it needed to be. As George O’Connor said in his morning note today “This proves (once again) that TalkTalk don’t have a clue about what’s going on and have poor levels of monitoring and worse on crisis management”.
If you read the marketing put out by our industry you can see we cl
Donald Trump marketing masterclass with his plain English – being able to tell a story in plain simple English will never lose its importance and the best place to learn is from the mastesr
AWS, Packet, Google, FB, Snapchat, Amazon , VMWare Microsoft, Amazon, BT
(note MSFT used to have the superb tag line of ‘computer on every desk and in every home’)