D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
Learn about the most important aspects of a Web Application Firewall your organization needs to have in place to protect against the most critical web application security risks. Plus, see how we’re evolving to ensure you’re protected against new attack campaigns.
Get an inside look at Incapsula Security, straight from the Security Research Team. Plus, get your vulnerability management strategy on track by assessing the automated threats you face and learn about the new security features we’re working on to keep you protected.
Learn everything from the Imperva resources you can count on when you need help, to how you can bolster your security and performance by working with the Incapsula support organization.
Jon Epstein - LAC 2017 - Disruptive technologies: AI and the future of market...iGB Affiliate
It's never been a better or a more daunting time to be a marketer. New disruptive technologies are changing how we shop, how we sell and even how we experience our digital worlds. Artificial intelligence, virtual reality, IoT and augmented reality will fundamentally change the landscape for marketers over the next 5 years. And for affiliate marketers, understanding this new landscape will spell the difference between growth and decline.
In this session, Sentient Technologies CMO Jon Epstein will look at new technologies disrupting marketing today, as well as what's on the horizon. The presentation will inform you about key trends you need to stay aware of and discuss the kinds of impacts they could have on how you work and the results you can achieve.
Key trends in marketing technologies to stay aware of
What the impact will be on affiliate marketing results in the future
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
Learn about the most important aspects of a Web Application Firewall your organization needs to have in place to protect against the most critical web application security risks. Plus, see how we’re evolving to ensure you’re protected against new attack campaigns.
Get an inside look at Incapsula Security, straight from the Security Research Team. Plus, get your vulnerability management strategy on track by assessing the automated threats you face and learn about the new security features we’re working on to keep you protected.
Learn everything from the Imperva resources you can count on when you need help, to how you can bolster your security and performance by working with the Incapsula support organization.
Jon Epstein - LAC 2017 - Disruptive technologies: AI and the future of market...iGB Affiliate
It's never been a better or a more daunting time to be a marketer. New disruptive technologies are changing how we shop, how we sell and even how we experience our digital worlds. Artificial intelligence, virtual reality, IoT and augmented reality will fundamentally change the landscape for marketers over the next 5 years. And for affiliate marketers, understanding this new landscape will spell the difference between growth and decline.
In this session, Sentient Technologies CMO Jon Epstein will look at new technologies disrupting marketing today, as well as what's on the horizon. The presentation will inform you about key trends you need to stay aware of and discuss the kinds of impacts they could have on how you work and the results you can achieve.
Key trends in marketing technologies to stay aware of
What the impact will be on affiliate marketing results in the future
Moving to the cloud means that you can implement changes to systems fast, but too many times delays happen because it takes too long to get the Authorization to Operate (ATO). By reevaluating the agency's Risk Management Framework (RMF), NGA has enabled its team to deliver software to the agency's mission at a faster pace never before possible. The presentation will describe the modified assessment and authorization process, the use of DevOps and Agile methodologies and the role of security automation to speed ATO. Learn More: https://aws.amazon.com/government-education/
An Introduction to AWS: A Platform Overview | AWS Public Sector Summit 2017Amazon Web Services
AWS provides on-demand computing resources and services in the cloud with pay-as-you-go pricing. This session produces a foundational understanding of AWS and illustrates how tapping into AWS resources rather than depending on your own is like purchasing electricity from a power company instead of running your own generator. Using AWS services delivers many of the same benefits as a public utility: capacity that exactly matches your need, payment only on what you use, lower costs due to economies of scale, and service from a vendor experienced in running large-scale networks. Listen to a high-level overview of AWS’s infrastructure and AWS services and trace the progression of AWS since 2008 as we've grown from a handful of IaaS services to a massive platform of 80+ IaaS, PaaS, and SaaS services. Attend this session to fully comprehend the unending possibilities that AWS creates for its users today. Learn how AWS is empowering customers to consume AWS capabilities at the same rapid rate that AWS innovates. Learn More: https://aws.amazon.com/government-education/
NUS-ISS Learning Day 2017 - Do You Want to Design A Great Mobile App?NUS-ISS
By Mr. Chris Hampartsoumian, Technical Director, Asia Pacific, Accedo
Many of us are highly dependent on our smartphones and tablets for consuming media and accessing online service, such as for banking and shopping, at any time and from anywhere. The mobile application (app) software is downloaded to run on the smart device, but many ‘back end’ services are needed for it to work in a functional, secure, reliable and scalable way. Many mobile apps need to ‘connect to the cloud’ to use services provided by cloud platforms.
This talk will explore how to design and develop a mobile app that consumes cloud services, including for application processing, data storage, authentication and authorisation. We will describe the steps needed to do test and deploy the app to users after meeting the platform’s compliance requirements.
The cloud enables every organisation to have enterprise-grade security. You don't have to have a dedicated cloud security team to have strong security in the cloud, nor does having a high-security bar mean your teams have to slow down. This session will take you through patterns you can implement today to raise your security posture without needing to hire additional staff or breaking the bank. Attendees are expected to already have an understanding of the AWS responsibility model. This session will also demonstrate how AWS Organizations can be leveraged to add guardrails to your AWS usage in addition to the steps needed to set up a secure data bunker.
Presenter: Byron Pogson, Solutions Architect, AWS
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFULPluggedIn BD
• Kick-ass positioning is:
1. Differentiated,
2. Relevant to the customer,
3. Relies on real capabilities.
• Go deep!
o Avoid misperception of your own capabilities
o Start with “WHY?” (sometimes)
o Obtain emotional insight.
• Tips (‘Sensitivity’):
o Be memorable
o Make an emotional connection
o Use human words (rather than buzz and acronyms)
o Less is more (make them cry in 6 words..)
o Give numbers meaning! (sold as many access-points as Britney albums..)
The Importance of Cybersecurity in 2017R-Style Lab
Small and medium-sized companies embrace digital transformation in order to cut operating costs, boost employee productivity and gain a better insight into customer behavior. However, they tend to underestimate the importance of cybersecurity… and end up paying ransoms to hackers due to weak defense systems. Why is cybersecurity important and how to protect your enterprise IT infrastructure?
An overview of the trends that will forever disrupt and transform the real estate industry. Topics include convergence, #DigitalCeiling, UPoE, Power-over-Ethernet. And how Cisco Canada is reaping the benefits at its new Canadian HQ in Toronto (RBC Waterpark Place) by Oxford Properties.
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
How should startups embrace the trend of IoT and Big DataRuvento Ventures
This presentation prepared by Ruvento Ventures gives comprehensive coverage of the state of IoT, Big Data and AI industries. It covers the latest trends and most successful investments in Consumer Hardware. Moreover, we tried to give pieces of advice to startups working in the intersection of IoT, Big Data and AI.
Cybersecurity in the Workplace is Everyone's Business Symantec
Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.
Leveraging Location-Based Insights to Maximize Mobile Advertising RevenueMediaPost
Time spent in-app continues to increase and consumers are more willing to share personal data if they believe they’ll be presented with relevant offers and advertising. When approached with predictive and contextually relevant experiences, consumers are more likely to engage with content and advertising offers. In this session, Verve explores how to help publishers drive higher margins and advertising performance through patented location intelligence that produces greater insights into consumer geo-behaviors and creates unique mobile experiences that demand engagement and interaction.
Moving to the cloud means that you can implement changes to systems fast, but too many times delays happen because it takes too long to get the Authorization to Operate (ATO). By reevaluating the agency's Risk Management Framework (RMF), NGA has enabled its team to deliver software to the agency's mission at a faster pace never before possible. The presentation will describe the modified assessment and authorization process, the use of DevOps and Agile methodologies and the role of security automation to speed ATO. Learn More: https://aws.amazon.com/government-education/
An Introduction to AWS: A Platform Overview | AWS Public Sector Summit 2017Amazon Web Services
AWS provides on-demand computing resources and services in the cloud with pay-as-you-go pricing. This session produces a foundational understanding of AWS and illustrates how tapping into AWS resources rather than depending on your own is like purchasing electricity from a power company instead of running your own generator. Using AWS services delivers many of the same benefits as a public utility: capacity that exactly matches your need, payment only on what you use, lower costs due to economies of scale, and service from a vendor experienced in running large-scale networks. Listen to a high-level overview of AWS’s infrastructure and AWS services and trace the progression of AWS since 2008 as we've grown from a handful of IaaS services to a massive platform of 80+ IaaS, PaaS, and SaaS services. Attend this session to fully comprehend the unending possibilities that AWS creates for its users today. Learn how AWS is empowering customers to consume AWS capabilities at the same rapid rate that AWS innovates. Learn More: https://aws.amazon.com/government-education/
NUS-ISS Learning Day 2017 - Do You Want to Design A Great Mobile App?NUS-ISS
By Mr. Chris Hampartsoumian, Technical Director, Asia Pacific, Accedo
Many of us are highly dependent on our smartphones and tablets for consuming media and accessing online service, such as for banking and shopping, at any time and from anywhere. The mobile application (app) software is downloaded to run on the smart device, but many ‘back end’ services are needed for it to work in a functional, secure, reliable and scalable way. Many mobile apps need to ‘connect to the cloud’ to use services provided by cloud platforms.
This talk will explore how to design and develop a mobile app that consumes cloud services, including for application processing, data storage, authentication and authorisation. We will describe the steps needed to do test and deploy the app to users after meeting the platform’s compliance requirements.
The cloud enables every organisation to have enterprise-grade security. You don't have to have a dedicated cloud security team to have strong security in the cloud, nor does having a high-security bar mean your teams have to slow down. This session will take you through patterns you can implement today to raise your security posture without needing to hire additional staff or breaking the bank. Attendees are expected to already have an understanding of the AWS responsibility model. This session will also demonstrate how AWS Organizations can be leveraged to add guardrails to your AWS usage in addition to the steps needed to set up a secure data bunker.
Presenter: Byron Pogson, Solutions Architect, AWS
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFULPluggedIn BD
• Kick-ass positioning is:
1. Differentiated,
2. Relevant to the customer,
3. Relies on real capabilities.
• Go deep!
o Avoid misperception of your own capabilities
o Start with “WHY?” (sometimes)
o Obtain emotional insight.
• Tips (‘Sensitivity’):
o Be memorable
o Make an emotional connection
o Use human words (rather than buzz and acronyms)
o Less is more (make them cry in 6 words..)
o Give numbers meaning! (sold as many access-points as Britney albums..)
The Importance of Cybersecurity in 2017R-Style Lab
Small and medium-sized companies embrace digital transformation in order to cut operating costs, boost employee productivity and gain a better insight into customer behavior. However, they tend to underestimate the importance of cybersecurity… and end up paying ransoms to hackers due to weak defense systems. Why is cybersecurity important and how to protect your enterprise IT infrastructure?
An overview of the trends that will forever disrupt and transform the real estate industry. Topics include convergence, #DigitalCeiling, UPoE, Power-over-Ethernet. And how Cisco Canada is reaping the benefits at its new Canadian HQ in Toronto (RBC Waterpark Place) by Oxford Properties.
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
How should startups embrace the trend of IoT and Big DataRuvento Ventures
This presentation prepared by Ruvento Ventures gives comprehensive coverage of the state of IoT, Big Data and AI industries. It covers the latest trends and most successful investments in Consumer Hardware. Moreover, we tried to give pieces of advice to startups working in the intersection of IoT, Big Data and AI.
Cybersecurity in the Workplace is Everyone's Business Symantec
Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.
Leveraging Location-Based Insights to Maximize Mobile Advertising RevenueMediaPost
Time spent in-app continues to increase and consumers are more willing to share personal data if they believe they’ll be presented with relevant offers and advertising. When approached with predictive and contextually relevant experiences, consumers are more likely to engage with content and advertising offers. In this session, Verve explores how to help publishers drive higher margins and advertising performance through patented location intelligence that produces greater insights into consumer geo-behaviors and creates unique mobile experiences that demand engagement and interaction.
How can businesses take control of the security crisis that is controlling us? There are two choices. Either collaborate to harden defenses and innovate or stay stuck in the perfect storm created by the emerging technologies and attackers’ ability to use them against us. “Riding out” the storm is clearly NOT an option. Find out how to strengthen your business.
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
The impact of security threats is increasingly devastating. With the explosion of the IoT, cloud and mobile, digital technology is now pervasive. The opportunities for attack are surging, opening up new areas of vulnerability for security, privacy and data integrity. To truly defend and empower your organization, you also need to detect, intercept and remediate even the most unthinkable threats.
The Seven Axioms of Security - ITWeb 2017Saumil Shah
It is time to transition defense from being reactive to proactive. This talk discusses seven axioms for implementing proactive defense strategy and measures for the future, concluding with a blueprint of the next evolution of pro-active defense architecture.
Financial Services Forum_New York, May 17, 2017Splunk
Splunk Financial Services Forums are designed to teach companies like yours that are turning terabytes of machine data – collected daily for high-volume activities like trading, claims processing and multi-channel banking – into valuable insights.
These insights help financial services organizations improve security, reduce fraud, achieve regulatory compliance, gain deeper customer insights, obtain end-to-end visibility and much more.
In this presentation, we cover advanced mitigation techniques used by Behemoth 2 – our latest mitigation platform – as well as real-life examples of different DDoS attack vectors and traffic samples. Plus, learn how we utilize a network of 4.7 Tbps to handle complex high throughput attacks and get a heads up on the latest trends we’re seeing in DDoS attacks.
Scott Helme, renowned security researcher and international speaker, shares his unique perspective on content security policy and how security has evolved.
Phil Williams, Principal Cloud Solutions Architect, explains how to evaluate your exposure to DDoS attack and how to best shape your defenses to budget requirements.
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnImperva Incapsula
In this session, learn how the Greek Orthodox Archdiocese of America was able to customize their Incapsula service to accommodate a single sign-on solution.
In this session, learn how The Economist approached migrating to the cloud and moving economist.com from legacy datacenters to Amazon Web Services (AWS).
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Jeff Serota, Technical Account Manager, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Peter Klimek, Principal Security Engineer, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
Incapsula introduced Application Delivery Rules (ADR) in October of 2016, but many clients have not tapped into their powerful abilities. In this session, Jeff Serota, Technical Account manager, provides an overview of ADR, discusses how they differ from IncapRules, and teaches you how to leverage them in your own Incapsula deployment.
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...Imperva Incapsula
It can be challenging for security teams to cut through the clutter of SIEM logs in order to analyze security information and alerts. In this session, Bryan Jones, Senior Security Engineer, walks you through the 5 major configuration steps needed to help you better manage security issues across your entire tech stack.
In this session, David Ting, VP of Engineering at DataVisor, explores the latency challenges associated with a global client base and what can be learned when implementing a performance-improving solution.
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedImperva Incapsula
Moving your critical applications from on-premises servers to the cloud can be a daunting prospect — but it doesn't need to be. Drawing on over 5 years of experience bringing some of the largest CMS sites on the Web into the cloud, Vasken Hauri, VP of Engineering at 10up, covers the key aspects you'll need to consider to ensure a smooth and successful migration. He also touches on some best practices you can apply post-migration to keep your sites secure, performant, and worry-free in an era where our toasters can launch DDoS attacks.
Keynote presentation by Dvir Shapira, Director of Product Management. Opening remarks include a look at where we’ve been in terms of the Internet as a whole and Internet security and performance, as well as where we’re going.
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...Imperva Incapsula
As more people shop online, it’s critical that your website meets—and even exceeds—their expectations. Online shoppers want sites that are easy to use and don’t waste their time.
According to a recent Imperva Incapsula survey, more than 60% of users said they wouldn’t wait more than five seconds for a site to load. And almost 70% said that poor website performance would cause them to leave a site and never return.
If you’re serious about reaping the benefits of the significant growth in online shopping, it’s time to get your web “house” in order. And a new free webinar from Imperva can help.
A secure web server isn’t really secure if the infrastructure supporting it remains vulnerable. Unless you implement infrastructure protection, your non-HTTP assets are vulnerable and you may not be as protected as you think you are.
You may be like others who need to get better DDoS protection but haven’t been able to or had to settle for an imperfect solution because of deployment limitations such as protocol dependencies and BGP restrictions. Incapsula IP Protection has now overcome these barriers — and we are the only service that can do it.
At this webinar our product experts will discuss how Incapsula customers are adopting IP Protection and bringing their DDoS protection to the next level. We’ll also have a discussion with Imperva CISO Shahar Ben-Hador who will share insights on how we use IP Protection and real-world lessons learned.
You need to protect more than just your web servers from DDoS attacks. We’ll address these questions:
Why do you need to protect more than just your web servers?
What were the limitations others ran into when they tried to do it?
How did Incapsula help them overcome the limitations?
...and much more!
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
DDoS attacks are bigger and more sophisticated than ever before. Odds are your business is going to be attacked – and without an effective mitigation strategy, you don't stand a chance.
In this webinar Andrew Shoemaker a DDoS simulation expert from NimbusDDOS gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend them.
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
By Nabeel Saeed
This presentation explores the current DDoS attack landscape, it covers the basics of DDoS attacks, current trends including the most recent results from the newly published 2015 Imperva Incapsula DDoS Report. It also discusses a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, this presentation explores the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault. This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
The webinar gives an overview of and compares the two platforms: Incapsula and Akamai. In addition to the benefits of migrating to Incapsula, it covers planning, transitioning, configuring Incapsula and lessons learned from the field.
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
All too often, online threats such as DDoS attacks, scrapers, or traffic that consumes too much bandwidth are disrupting or slowing down SaaS websites. It is now more important than ever to keep website traffic flowing quickly without service interruptions.
Tempus Technologies’ president, Jason Sweitzer, talks about the technological challenges his company faced and the solutions his team adopted to increase website acceleration and uptime.
Join us for Incapsula’s free 30-minute webinar to learn how you can increase your website’s uptime and enhance its performance. We’ll be discussing opportunities SaaS companies can explore through WAF protection, frontend SSL, failover ISPs, and against DDoS attacks and using Incapsula solutions.
Is the Cloud Going to Kill Traditional Application Delivery?Imperva Incapsula
Application delivery controllers provide load balancing, acceleration, traffic shaping and other services that improve the performance, availability and security of web applications. But with more and more web application developers hosting their applications in the cloud, using application delivery hardware is often a non-starter.
This presentation discusses the architecture of a new type of service called the Application Delivery Cloud. This new cloud service not only offers critical performance, availability and security capabilities to web application vendors, it goes beyond its hardware analog to deliver new capabilities that today’s applications require, including regional content policies and up-to-the-minute security intelligence.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Jan 21, 2009 - Anonymous the First in a Series of High Profile DDoS Attacks and Website Defacement Attacks
Project Chanology was launched in response to the Church of Scientology trying to remove an infamous Tom Cruise interview video from the internet
March 24, 2012 - ~60Gbps DDoS Attack Impacts Canadian political party elections. The DDoS attack delayed voting and reduced turnout, impacting Canada’s New Democrat Party.
March 16, 2013 – 300Gbps Spamhaus was targeted for naming and blocklisting cybercrime hosting enterprises, spam and botnet operations
Oct 2016 – 600Gbps Kerbes blog attacked by Mirai IoT botnet
1Tbps Dyn Attacked by Mirai launches 1Tbps multi vector DDoS attack against DNS infrastructure, taking many of the world's most popular websites offline.
The CSO office has more ground to cover and not enough resources
The expectation people have of software have changed dramatically over the last decade. We expect reliable and convenient services that are regularly improve in a agile pace.
The demand influence on how we deploy code “continues delivery”.
Developers are expecting to have more functionality moved from the backend webservers to be placed at the edge