Every IT manager, sysAdmin, or developer is facing an increasing demand to put in place security measures that improve infrastructure and applications, while complying with projects requirements.
You've probably heard all this before, but with very few solid ways to tackle the real security issues.
We're here to cut through the jargon overdose and show you practical, live examples of a few common - and surprisingly simple - vulnerabilities being exploited in real time. We’ll also show you how quickly we can solve them in OutSystems.
Learn about:
- Layered Security in OutSystems
- Open Communication Channels, Cookies, and Session Fixation Attacks
- Code Injection
- Open Redirection Attacks
- * Sensitive User Forms Protection in OutSystems
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
Regulatory requirements such as GDPR are
platform agnostic – and who can predict what
further challenges lie ahead? It certainly will not
become any easier. Security for the mainframe
is likely to remain a live issue. If you have a
mainframe then this affects you. Fortunately, the
help is out there. Attend this session to discover
how Micro Focus can secure your mainframe
environment today and into the future.
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017Micro Focus
The cyber threats facing businesses today are
constantly evolving. They are being perpetrated
by highly skilled, well-organized and well-funded
groups.
In this session we’ll take a look at
some of these threats, and how you can
mitigate your risks.
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTMicro Focus
Micro Focus Retain provides unified archiving of all
business communication, including email, social media,
and mobile communication data for case assessment,
search, and eDiscovery.
Use it in house or in the Cloud. So what does that
mean to you, and why do you need it? Check out the charts
and find out for yourself.
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
Regulatory requirements such as GDPR are
platform agnostic – and who can predict what
further challenges lie ahead? It certainly will not
become any easier. Security for the mainframe
is likely to remain a live issue. If you have a
mainframe then this affects you. Fortunately, the
help is out there. Attend this session to discover
how Micro Focus can secure your mainframe
environment today and into the future.
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017Micro Focus
The cyber threats facing businesses today are
constantly evolving. They are being perpetrated
by highly skilled, well-organized and well-funded
groups.
In this session we’ll take a look at
some of these threats, and how you can
mitigate your risks.
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTMicro Focus
Micro Focus Retain provides unified archiving of all
business communication, including email, social media,
and mobile communication data for case assessment,
search, and eDiscovery.
Use it in house or in the Cloud. So what does that
mean to you, and why do you need it? Check out the charts
and find out for yourself.
This presentation will give an introduction to Isto followed by an overview of the Isto architecture.
We will look at the main Isto components, and the benefits of Isto.
Then, we will look at how to use the Istio mutual TLS (mTLS) for service-to-service authentication.
Finally, the presentation will include a demonstration which will show how Isto can be used to collect and monitor metrics from microservices.
How to Deploy WSO2 Enterprise Integrator in ContainersWSO2
This slide deck explores how WSO2 Enterprise Integrator can be deployed on a containerized deployment and the key configuration steps of successful production deployment and monitoring.
Watch webinar here: https://wso2.com/library/webinars/2018/10/how-to-deploy-wso2-enterprise-integrator-in-containers/
This preentation is about -
Inbound SSL,
SSL Configuration object,
Outbound SSL,
Monitoring Certificate Expiry,
For more details visit -
http://vibranttechnologies.co.in/websphere-classes-in-mumbai.html
More and more enterprises are restructuring their development teams to replicate the agility and innovation of startups.
In the last few years, microservices have gained popularity for their ability to provide modularity, scalability, high availability, as well as make it easier for smaller development teams to develop in an agile way.
But how do they deal with security? what about security contexts?
This talk will give insights about the most interesting issues found in the last years while testing the security of multilayered microservices solutions and how they were fixed.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOpenIDFoundation
Roland Hedberg with Catalogix and the OpenID Foudation provided an update on OpenID Connect Federation at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
Unlike other mobile file access and collaborative file sharing solutions, Micro Focus Filr (formerly Novell Filr) has been designed with the enterprise in mind, resulting in less administration, better security, and more productive users.
Learn best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaPatrick Sklodowski
Cloud Security is YOUR responsibility, not just your service provider! Understand the shared responsibilities of Cloud Computing from the public cloud to application as a service
Sync or swim: the challenge of complex offline appsOutSystems
Video: https://www.outsystems.com/learn/courses/56/webinar-the-challenge-of-complex-offline-apps/
The requirement is usually stated in very simple terms: deliver an app that is available in all connectivity conditions. However, the solution can be anything but simple.
When data management rears its ugly head, things get really tricky fast..How are you going to synchronize that data?
Conflicts will most definitely occur and the strategy to approach them depends on how clever your implementation is.
There is no silver bullet! But we can help you think it through. If you were on hand when we showed you how to discover some of the most common sync patterns and techniques, you got a preview.
Make no mistake, though: we're going beyond the common and we're delving deep. So, if you weren’t around for Create Your Offline App, no worries - we’ll get you fully up to speed. We're not going to feed you for a day, we're here to teach you how to fish!
In this webinar you will:
- Review some of the common sync patterns OutSystems handles.
- Understand how the synchronization process happens in the background.
- Learn how to translate offline-first thinking into development best practices.
- Learn how to implement a more advanced sync scenario.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinars - Secret hacks for OutSystems 10OutSystems
OutSystems Wizard Stacey Levine will unveil the "Secret Hacks for OutSystems 10" that will make you love the platform. This webinar will focus on the features and accelerators that make hardcore development a breeze.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
This presentation will give an introduction to Isto followed by an overview of the Isto architecture.
We will look at the main Isto components, and the benefits of Isto.
Then, we will look at how to use the Istio mutual TLS (mTLS) for service-to-service authentication.
Finally, the presentation will include a demonstration which will show how Isto can be used to collect and monitor metrics from microservices.
How to Deploy WSO2 Enterprise Integrator in ContainersWSO2
This slide deck explores how WSO2 Enterprise Integrator can be deployed on a containerized deployment and the key configuration steps of successful production deployment and monitoring.
Watch webinar here: https://wso2.com/library/webinars/2018/10/how-to-deploy-wso2-enterprise-integrator-in-containers/
This preentation is about -
Inbound SSL,
SSL Configuration object,
Outbound SSL,
Monitoring Certificate Expiry,
For more details visit -
http://vibranttechnologies.co.in/websphere-classes-in-mumbai.html
More and more enterprises are restructuring their development teams to replicate the agility and innovation of startups.
In the last few years, microservices have gained popularity for their ability to provide modularity, scalability, high availability, as well as make it easier for smaller development teams to develop in an agile way.
But how do they deal with security? what about security contexts?
This talk will give insights about the most interesting issues found in the last years while testing the security of multilayered microservices solutions and how they were fixed.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOpenIDFoundation
Roland Hedberg with Catalogix and the OpenID Foudation provided an update on OpenID Connect Federation at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
Unlike other mobile file access and collaborative file sharing solutions, Micro Focus Filr (formerly Novell Filr) has been designed with the enterprise in mind, resulting in less administration, better security, and more productive users.
Learn best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaPatrick Sklodowski
Cloud Security is YOUR responsibility, not just your service provider! Understand the shared responsibilities of Cloud Computing from the public cloud to application as a service
Sync or swim: the challenge of complex offline appsOutSystems
Video: https://www.outsystems.com/learn/courses/56/webinar-the-challenge-of-complex-offline-apps/
The requirement is usually stated in very simple terms: deliver an app that is available in all connectivity conditions. However, the solution can be anything but simple.
When data management rears its ugly head, things get really tricky fast..How are you going to synchronize that data?
Conflicts will most definitely occur and the strategy to approach them depends on how clever your implementation is.
There is no silver bullet! But we can help you think it through. If you were on hand when we showed you how to discover some of the most common sync patterns and techniques, you got a preview.
Make no mistake, though: we're going beyond the common and we're delving deep. So, if you weren’t around for Create Your Offline App, no worries - we’ll get you fully up to speed. We're not going to feed you for a day, we're here to teach you how to fish!
In this webinar you will:
- Review some of the common sync patterns OutSystems handles.
- Understand how the synchronization process happens in the background.
- Learn how to translate offline-first thinking into development best practices.
- Learn how to implement a more advanced sync scenario.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinars - Secret hacks for OutSystems 10OutSystems
OutSystems Wizard Stacey Levine will unveil the "Secret Hacks for OutSystems 10" that will make you love the platform. This webinar will focus on the features and accelerators that make hardcore development a breeze.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinar: Enterprise application performance with server push technol...OutSystems
1st Session - WebSockets, a Server Push Technology:
- Differences between Pull and Push technologies
- What are WebSockets
- A bit of History behind WebSockets
- When to use WebSockets
- How to integrate WebSockets with OutSystems
- Considerations when using WebSockets
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Love it or hate it, bimodal IT has become a hot topic that every IT leader has to grapple with. Learn about these topics with this (delicious) slidedeck.
Training Webinar - Wireframing made easyOutSystems
www.outsystems.com
"Wireframing Made Easy" is a hands-on course that will encourage you to start from simply sketching on a piece of paper, to laying out more refined structures - wireframes - and all the way up to creating interactive prototypes enabled with InVision.
Join the "Wireframing Made Easy" webinar to learn how to apply the UX process essentials to create a sample application: from the gathering of requirements to wireframes, the OutSystems way - fun and dynamic.
To hit the ground running, you will learn different techniques and how to use supporting software. This workshop will help you improve communication with teams and clients, impressing them with the visual representation of your ideas, all the while shortening development time.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
We kick off our digital transformation leadership series by tackling three of the most challenging questions organizations face as they think about their digital transformation strategy. Find out what they are with this slide deck.
State of application development - 2017 research reportOutSystems
Over 3,200 IT professionals from 40 countries share their insights in one of the most comprehensive research reports on the state of digital transformation and application development in 2017. Learn about the Mobile and Web Application Development Trends for 2017, the biggest challenges for IT teams and the rise of new approaches like Low-Code Platforms and Citizen Developers to effectively support mobile application development and digital transformation.
Ready to launch your digital transformation initiatives but not sure how or where to start? Learn from battle-proven IT execs and implementation experts as they share lessons learned about how to avoid the most common speed bumps teams hit along the way.
Training Webinar: Enterprise application performance with distributed cachingOutSystems
2nd Session - Distributed Caching:
- What is Distributed Caching
- Performance hurdles solved by Distributed Caching
- When to use Distributed Caching
- Patterns to Populate a Distributed Cache
- How to use Distributed Caching in OutSystems
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinar: Fitting OutSystems applications into Enterprise ArchitectureOutSystems
Want to become an expert architect in 60 minutes?
We're having a quick hands-on session to show how to design evergreen applications that will grow with your company strategy - from initial design to keeping the blueprint of your applications healthy as you need to adapt to new business demands
In this session you will learn:
- The 4 Layer Canvas concepts - the OutSystems architecture framework
- How to use the the Canvas to design a new solution
- How to use Discovery (tool available in the Forge) to keep track of your architecture and extract useful recommendations to fix architecture issues
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinar: Top front-end techniques for OutSystemsOutSystems
How do front-developers that have started testing or working with OutSystems generally view the Platform, before they get to fully harness its power? They usually say it's more restrictive than they're used to and that it doesn't allow them to do what they need to do.
Fear no more! We're here to debunk that myth and show you that behind all its nuances, OutSystems has a truly powerful Platform that can enable you to build pretty much anything.
In this webinar, you will:
- Slay a dragon named "You can't do that with OutSystems!"
- Understand (some of) the inner workings of the Platform.
- Get some tips on how to organize your front-end code in a better way.
- Learn how you can become much more productive doing front-end work with OutSystems.
- Become an awesome front-end developer.
It's all up to you, but we're giving you all the tools!
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Training Webinar: From a bad to an awesome user experience - Training WebinarOutSystems
How can you build an awesome app that looks cool and fresh while providing a great user experience? Discover how to beat the UX and UI design blues and produce apps that everyone loves to use.
- Why an awesome UX is critical
- What you gain by talking to users
- What an MVE is and what it does
- How to go from a screen to an experience
- How to avoid UX traps and go after the rainbow.
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
App Development Disrupted: Answers and results from the 2017 State Of App Dev...OutSystems
In this presentation, we look at the results of that State of App Dev 2017 research to answer five important questions:
1- What are the major challenges facing IT professionals today?
2- Is the demand for applications growing and, if so, what are the implications?
3- What are the highest priority application types, systems, and development approaches that make up the digital transformation landscape?
4- How are organizations dealing with the rise of citizen developers and the developer skills gap?
5- Are organizations embracing new approaches, like low-code platforms, to accelerate digital transformation?
Technical Webinar: By the (Play) Book: The Agile Practice at OutSystemsOutSystems
In 2001, the Agile Manifesto took the world by storm, and it changed how software is built forever. Also in 2001, OutSystems, another disruptive force in the world of traditional waterfall software development, was born.
Not coincidentally, OutSystems has been using Agile Practices all along. However, because of the sheer speed at which we’re able to respond, we’ve had to come up with a few twists in our approach. We’re even putting it into a services delivery playbook.
In our webinar, “By the (Play)Book: The Agile Practice at OutSystems,” Engagement Guild Master and Expert Nuno Fernandes will show you how OutSystems approaches Agile Development and makes sure nothing slips.
In this session you will:
- Learn roles and respective responsibilities.
- Understand project phases with a clear focus on sprint development.
- Discover how we approach the user story life cycle in particular.
- See how a really solid structure, calendar and organization help maximize productivity.
Webinar: https://www.outsystems.com/learn/courses/59/webinar-the-agile-practice-at-outsystems/
Free Online training: https://www.outsystems.com/learn/courses/
Follow us on Twitter http://www.twitter.com/OutSystemsDev
Like us on Facebook http://www.Facebook.com/OutSystemsDev
Security Webinar: Harden the Heart of Your WordPress SiteSeWP Engine
Discover the OWASP Top 10 web vulnerabilities and how to mitigate the risk associated with each for your website.
Register to watch on-demand webinar here: https://wpengine.com/resources/security-webinar-harden-heart-wordpress-site/
Guest lecture on web application security, presented to students at the Indianapolis campus of The Iron Yard on November 9, 2016. This presentation was a basic overview/introduction to security, discussed the CIA Triad, why security is difficult, what happens if we don't do security right, what developers can do to enhance security, and included a brief overview of the OWASP Top Ten.
In early 2019, Microsoft created the AZ-900 Microsoft Azure Fundamentals certification. This is a certification for all individuals, IT or non IT background, who want to further their careers and learn how to navigate the Azure cloud platform.
Learn about AZ-900 exam concepts and how to prepare and pass the exam
The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.
This webcast series presents the OWASP Top 10 in an abridged format, interpreting the threats for you and providing actionable offensive and defensive best practices. It is ideal for all IT/development stakeholders that want to take a risk-based approach to Web application security.
How to Test for the OWASP Top Ten webcast focuses on tell tale markers of the OWASP Top Ten and techniques to hunt them down:
• Vulnerability anatomy – how they present themselves
• Analysis of vulnerability root cause and protection schemas
• Test procedures to validate susceptibility (or not) for each threat
Application Security session given as part of the Solvay Executive Master in IT Management.
Explaining application security challenges for web, mobile, cloud and internet of things.
Positioning OWASP SAMM as structural and measurable framework to get application security under control in the complete application lifecycle.
Eric Golpe. Security, privacy, and compliance concerns can be significant hurdles to cloud adoption. Azure can help customers move to the cloud with confidence by providing a trusted foundation, demonstrating compliance with security standards, and making strong commitments to safeguard the privacy of customer data. This presentation will educate you in the fundamentals of Azure security as they pertain to the Cortana Analytics Suite, including capabilities in place for threat defense, network security, access control, and data protection as well as data privacy and compliance. Go to https://channel9.msdn.com/ to find the recording of this session.
A series of Cyber security lecture notes..........................
(Endpoint, Server, and Device Security), (Identity, Authentication, and Access Management)
(Data Protection and Cryptography)
7 Step Checklist for Web Application Security.pptxProbely
As cybersecurity threats evolve, organizations must remain vigilant in protecting against the OWASP Top 10 vulnerabilities. It’s critical to implement effective mitigation strategies. Let’s explore seven best practices to effectively address these vulnerabilities and improve the security posture of your web application.
Innovating at the Speed of Business in the High-Bandwidth World of Digital MediaOutSystems
At NOS, the term “IT Driven” refers to IT activities as adding value to the business. That drove the use of low-code to speed up the delivery of critical projects their business needed. Hear how this leading telecommunications company grew through its relationship with OutSystems and evolved its processes into a bimodal IT approach to implement continuous delivery and provide app delivery roadmaps that benefits its customers and users.
Beyond “Location”: Informing Real-Estate Decisions Through Innovative TechnologyOutSystems
Beyond “Location”: Informing Real-Estate Decisions Through Innovative Technology
Colliers International is on a mission to empower its customers with innovative technology to help them make informed decisions. In this session, see how the company addressed modernization challenges, rewrote a mission-critical application, replaced much of its legacy technology, and produced more applications in the last two years than it had in the last decade.
Beyond Digital Transformation: A Mandate for Disruptive Innovation in the Age...OutSystems
Before a customer ever sees your product, there are hundreds of processes, tools, decisions, and people that impact its delivery. Learn more about how the CVS Health business, swift, implemented the transformative power of low-code to create a wave of disruptive innovation that has impacted every aspect of its business and has the potential to redefine its industry.
From Core Systems to Mobile Apps: Digital Transformation from the Inside-OutOutSystems
When Chilean telecom leader, Entel, launched its digital transformation project, it followed the guidance of experts: Start with your core and work outwards. With its core modernized, the company released a new mobile app in less than a year. Hear how the company’s focus on core systems first, allowed it to layer on innovative new services helping it become not just a leader in Chile, but a challenger in the Peruvian market as well.
Orchestrating the Art of the Impossible Using Low-Code to Automate Manual Wor...OutSystems
Task and process automation is often praised as the holy grail of cutting costs and maximizing profitability. But what about less tangible activities such as compliance and auditing? Join Standard Insurance Company and hear how OutSystems helped them automate and minimize manual work steps resulting in across-the-board efficiencies that saved time and money.
Fast and Furious: Modernizing Clinical ApplicationOutSystems
Twice, Mednax has attempted to modernize its legacy clinical app. After the most recent 6-year project was canceled prior to deployment, Mednax turned to OutSystems. In just five months, the company rolled out an MVP and in eight months the new Clinical Application went live. Hear this amazing success story that is helping to reduce the burden on providers and deliver better patient care where it matters most.
Enrich Visually Google Map Information With LayersOutSystems
In this lightning session, we will explain that maps should not be boring! With our KML for Google Maps component, we have enriched them visually and with real-time business information to provide maps for users to love.
Using Processes and Timers for Long-Running Asynchronous TasksOutSystems
What do you do when a task can take more than five minutes and then times out? How do you run it asynchronously and present the status to the user? Come and see how processes and timers can be used together.
"With OutSystems, we can publish our application with the click of a single button. How awesome would it be if we could create an entire OutSystems infrastructure with just one click?
This is possible! In this session, we will tell you all the secrets about unattended installation and/or upgrading the OutSystems platform."
Many OutSystems projects begin simply. The requirements are not complex and therefore, neither is the architecture. But, as implementations grow, so grows the complexity and functionality needs of the enterprise. In this session, we will explore the 4-Layer Architecture and show you what we encountered, and learned, moving from a simple architecture to a 4-Layer one.
Speed up Development by Turning Web Blocks Into First-Class CitizensOutSystems
"What if:
- You could have a 2-way sync between a (structure) variable and a we block (e.g. input widgets)
- There was a valid runtime property for web blocks (e.g. built-in widgets)
- Web block behaved LIKE built-in widgets?
In this talk, we will present an approach, and a couple of tools, that help promote web blocks to first class citizens. It has helped us speed up development and improve maintainability. Maybe it will also be helpful to you."
Sometimes we want our UI to respond to external events. With the power of Google's Firebase, we can interact with those events in OutSystems to build extremely powerful and interactive applications
Excited about the new reactive web features? Come to this session to learn some of the best practices to make sure that you get started on the right foot.
After five years, "Company X's" HR application was not performing very well due to legacy issues. Simply loading the Dashboard could take up to 10 minutes. We will share some tricks we used to make sure the Dashboard could be properly used again.
When setting up a new project we have some tips and tricks to help you do this in the best way possible, incl. infrastructure, database, standard attributes, logging, code alignment, and service center.
No API? No Problem! Let the Robot Do Your Work! Web Scraping and Automation W...OutSystems
Considering how popular APIs are these days, it’s frustrating to run into a service or site without one. But, it’s actually quite common. If you need to collect data or perform an action on the web without access to an API, there are a couple ways you can hack it using OutSystems.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. Ivo Gonçalves
Platform Operations
Expert Services
ivo.goncalves@outsystems.com
https://www.linkedin.com/in/ivomgoncalves
Paulo Costa
Platform Operations
Expert Services
paulo.costa@outsystems.com
https://www.linkedin.com/in/pauloalex
3. Agenda
• What is IT security?
• Layered security.
• Secure your infrastructure and your application with OutSystems recommendations:
○ 7 common vulnerabilities.
■ Vulnerability explanation and mitigation.
4. What is IT security?
“IT Security is the process of implementing measures and systems designed to securely
protect and safeguard information (...) against any unauthorized access, misuse,
malfunction, modification, destruction, or improper disclosure (...)”
Sans Institute
Confidentiality
Availability
Integrity
CIA Triad
Confidentiality
Prevent unauthorized parties to access the information.
Integrity
Prevent data manipulation and deletion by unauthorized parties.
Availability
Information is always available to authorized parties.
5. Layered security
“Layered security combines multiple security measures to make sure that you don't
have all your security eggs in one basket. This protects you from different sources and
different types of threats.”
Fortinet blog, 14 January 2014
Application
Application Servers
Systems and Network
Development practices
Security configurations deployed in the surrounding infrastructure
Security configurations deployed in the application servers
6. Security and OutSystems
● Generated code is subject of advanced vulnerability scanning.
○ OutSystems applications are mostly secure.
● Exploits on user code can still be present.
● Application Servers and Systems and Network layers may have vulnerabilities.
● No system is 100% secure.
11. Mitigation — HTTPS
Application Server Layer
• Acquire a digital certificate.
• Configure your application server to support HTTPS.
• Disable SSL 2.0 and 3.0.
• Prevent BEAST attacks.
• Mobile requires valid and trusted certificates.
12. • Enforce HSTS headers.
Mitigation — HTTPS
Application Server Layer
Service Center Lifetime
13. • HTTPS for all screens and integrations.
Mitigation — HTTPS
Application Server Layer
Service Center Lifetime
14. • HTTPS for all screens and integrations.
Mitigation — HTTPS
Application Layer
Web Screens
Integrations
Web Flows
22. Description
Injection/Code injection
• Application handles untrusted data poorly.
• Application allows relaying malicious code to other systems (e.g. SQL Injection).
• Application allows injecting code that is then interpreted/executed (e.g. XSS,
HTML injection).
23. Mitigation — Injection/Code Injection
Application Layer
• Escape content.
• Encode/Sanitize content.
• Mobile apps escape all inputted content.
25. Description
Open redirect
• AKA Unvalidated Redirects and Forwards.
• Application allows redirect requests to an untrusted URL.
• Commonly used for phishing attacks.
26. Mitigation — Open Redirect
Application Layer
• Don’t use dynamic URL redirects from input.
• If you do, use built-in functions:
○ ReplaceURLDomain
• If you need to redirect to other domains, check the input URL against a whitelist.
28. Description
Sensitive user forms with autocomplete
• User forms cache sensitive information (e.g. credit card number, email, etc).
• Allows retrieving previously used data.
29. Mitigation — Sensitive Information User Forms
Application Layer
• Disable autocomplete for sensitive user forms.
32. Mitigation — User Enumeration
Application Layer
• Display generic messages.
• Update the code that reveals user information.
33. OWASP 10 Matrix
OWASP Reference Webinar Reference
A1 Injection 4) Injections
A2 Broken Authentication and Session Management
1) Open communication channels
2) Session cookies without “secure” flag
3) Session fixation
A3 Cross-Site Scripting 4) Injections
A6 Sensitive Data Exposure
6) Sensitive user forms with autocomplete
7) User Enumeration
A10 Unvalidated Redirects and Forward 5) Open redirect