FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
The new model for stronger, simpler online authentication has implications beyond businesses and their consumers, including government policy and applications. FIDO was designed with security and privacy at the forefront, making it a natural ally for government initiatives in these areas. View slides from policy experts on the role of FIDO in policy, what the Alliance is doing in policy and how governments are working to implement FIDO.
Contents:
Review of FIDO Alliance
– FIDO’s mission and vision
– Key liaison relationships & government members
– How FIDO enhances privacy
FIDO in Government Services, a NIST Perspective
Introduction to FIDO’s Privacy and Public Policy Workgroup (P3WG) and some key outputs:
– Privacy White Paper
– EBA Response
FIDO’s fit in global regulatory approaches to security and privacy
– Supporting common policy goals
– Key differences from traditional 2-factor authentication
– Related activities, including Cybersecurtiy National Plan (US), and eIDAS (EU)
David Pollington, Head of Applications and Services at GSMA joins Bjorn Hjelm, Distinguished Member of Technical Staff at Verizon, to discuss Strong Authentication - Mobile Connect and FIDO.
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
An overview of FIDO authentication with a special section on government and policy. This was presented at the European Policy Forum by Jeremy Grant, managing director of The Chertoff Group.
FIDO® for Government & Enterprise - PresentationFIDO Alliance
With FIDO 1.0 standards published in December, 2015, mainstream product adoption and service deployment has begun with more announcement planned for the RSA Security Conference 2015. This webinar will feature FIDO highlights from the conference and a discussion of how governments and enterprises are engaging with FIDO Alliance and the new wave of innovative authentication solutions FIDO standards enable, with a special focus on how the US Government is positioning FIDO within the context of NSTIC (National Strategy for Trusted Identities in Cyberspace).
FIDO, Strong Authentication and elD in GermanyFIDO Alliance
Bernd Kowalksi of the Federal Office for Information Security discusses government objectives in strong ID and authentication, and derived identity and authenticity approach, while answering the questions, "Why did BSI join the FIDO Alliance?" and "What is the market perspective?"
Explore the status and future of FIDO in this presentation, which was given at the European Identity & Cloud Conference (EIC) in May, 2015.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
The new model for stronger, simpler online authentication has implications beyond businesses and their consumers, including government policy and applications. FIDO was designed with security and privacy at the forefront, making it a natural ally for government initiatives in these areas. View slides from policy experts on the role of FIDO in policy, what the Alliance is doing in policy and how governments are working to implement FIDO.
Contents:
Review of FIDO Alliance
– FIDO’s mission and vision
– Key liaison relationships & government members
– How FIDO enhances privacy
FIDO in Government Services, a NIST Perspective
Introduction to FIDO’s Privacy and Public Policy Workgroup (P3WG) and some key outputs:
– Privacy White Paper
– EBA Response
FIDO’s fit in global regulatory approaches to security and privacy
– Supporting common policy goals
– Key differences from traditional 2-factor authentication
– Related activities, including Cybersecurtiy National Plan (US), and eIDAS (EU)
David Pollington, Head of Applications and Services at GSMA joins Bjorn Hjelm, Distinguished Member of Technical Staff at Verizon, to discuss Strong Authentication - Mobile Connect and FIDO.
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
An overview of FIDO authentication with a special section on government and policy. This was presented at the European Policy Forum by Jeremy Grant, managing director of The Chertoff Group.
FIDO® for Government & Enterprise - PresentationFIDO Alliance
With FIDO 1.0 standards published in December, 2015, mainstream product adoption and service deployment has begun with more announcement planned for the RSA Security Conference 2015. This webinar will feature FIDO highlights from the conference and a discussion of how governments and enterprises are engaging with FIDO Alliance and the new wave of innovative authentication solutions FIDO standards enable, with a special focus on how the US Government is positioning FIDO within the context of NSTIC (National Strategy for Trusted Identities in Cyberspace).
FIDO, Strong Authentication and elD in GermanyFIDO Alliance
Bernd Kowalksi of the Federal Office for Information Security discusses government objectives in strong ID and authentication, and derived identity and authenticity approach, while answering the questions, "Why did BSI join the FIDO Alliance?" and "What is the market perspective?"
Explore the status and future of FIDO in this presentation, which was given at the European Identity & Cloud Conference (EIC) in May, 2015.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Google Case Study: Becoming UnphishableFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Introduces FIDO Authentication: the problem, the solution, the Alliance and the market. Presented by Brett McDowell, Executive Director of the FIDO Alliance.
Introduction to FIDO Alliance
by Brett McDowell, FIDO Alliance, Executive Director
from the FIDO Alliance Seminar in New York City on March 3, 2016, entitled "Key Trends in Strong Authentication"
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
Explore new directions for authentication and identification. Learn the inner workings of FIDO and PKI, and how to integrate these two worlds into one token.
Introduces why FIDO membership is beneficial to you - better security, reduced cost, simpler and safer for users. Presented by Brett McDowell, Executive Director of FIDO Alliance
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
The FIDO Alliance was launched with the audacious goal – to move the entire world away from usernames, passwords, and traditional multi-factor authentication to a much simpler and stronger way to log in with FIDO. It’s now 2021, so … are we there yet?
Join us for a webinar to take a look at the past year’s progress, and see what’s next. Our executive director and CMO Andrew Shikiar and our director of standards development David Turner will be on the line to take your questions – ask us anything!
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Authentication and ID Proofing in EducationFIDO Alliance
A case study from FIDO Member, Yubico, exploring a partnership with NIST to deploy secure online access for a US school district integrating ID proofing with FIDO U2F Authentication.
The FIDO Alliance has launched a new microsite, LoginWithFIDO.com, for high level, non-technical information about FIDO for consumers and service providers. As part of this project, we wanted to learn more about consumer attitudes and habits around authentication. What are their password habits? What do they think about the FIDO approach? Do they want to see FIDO at login?
To find out, we conducted a survey of 1,000 U.S. consumers – the results of which were shared on this webinar. These slides include the findings from our research and how you may be able to utilize the data for your own FIDO offerings and/or deployments.
This webinar includes:
--How many different passwords consumers really use for their online accounts
--What tactics they use for password management and how often they are resetting passwords and
--Their familiarity with various types of authentication technologies including SMS OTPs, biometrics and others
--The types of apps and services where consumers most want to use FIDO
--How consumers want to be communicated with about FIDO at enrollment and login
We also gave the audience a detailed look at LoginWithFIDO.com and how you can consider using it for your own educational initiatives around FIDO. You’ll learn:
--How to navigate through the microsite and its two landing pages
--How you can reference the site and its materials for your own offerings and deployments
--Added insights into how to utilize FIDO’s consumer-facing marks
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
With 50,000 employees and more than a billion users, security and privacy are of critical importance to the Internet giant, Google. Two years ago, they set out with the goal of improving authentication through stronger security, increasing user satisfaction and lowering support costs. In that time, Google deployed FIDO Certified ® security keys. A detailed analysis by this data-driven company has demonstrated clear confirmation of how well FIDO’s approach is suited to making stronger, simpler authentication for employees and consumers.
FIDO, Federation and the Internet of ThingsFIDO Alliance
Learn how FIDO-based authentication can complement federated authentication - and why they are better together.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Google Case Study: Becoming UnphishableFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Introduces FIDO Authentication: the problem, the solution, the Alliance and the market. Presented by Brett McDowell, Executive Director of the FIDO Alliance.
Introduction to FIDO Alliance
by Brett McDowell, FIDO Alliance, Executive Director
from the FIDO Alliance Seminar in New York City on March 3, 2016, entitled "Key Trends in Strong Authentication"
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
Explore new directions for authentication and identification. Learn the inner workings of FIDO and PKI, and how to integrate these two worlds into one token.
Introduces why FIDO membership is beneficial to you - better security, reduced cost, simpler and safer for users. Presented by Brett McDowell, Executive Director of FIDO Alliance
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
The FIDO Alliance was launched with the audacious goal – to move the entire world away from usernames, passwords, and traditional multi-factor authentication to a much simpler and stronger way to log in with FIDO. It’s now 2021, so … are we there yet?
Join us for a webinar to take a look at the past year’s progress, and see what’s next. Our executive director and CMO Andrew Shikiar and our director of standards development David Turner will be on the line to take your questions – ask us anything!
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Authentication and ID Proofing in EducationFIDO Alliance
A case study from FIDO Member, Yubico, exploring a partnership with NIST to deploy secure online access for a US school district integrating ID proofing with FIDO U2F Authentication.
The FIDO Alliance has launched a new microsite, LoginWithFIDO.com, for high level, non-technical information about FIDO for consumers and service providers. As part of this project, we wanted to learn more about consumer attitudes and habits around authentication. What are their password habits? What do they think about the FIDO approach? Do they want to see FIDO at login?
To find out, we conducted a survey of 1,000 U.S. consumers – the results of which were shared on this webinar. These slides include the findings from our research and how you may be able to utilize the data for your own FIDO offerings and/or deployments.
This webinar includes:
--How many different passwords consumers really use for their online accounts
--What tactics they use for password management and how often they are resetting passwords and
--Their familiarity with various types of authentication technologies including SMS OTPs, biometrics and others
--The types of apps and services where consumers most want to use FIDO
--How consumers want to be communicated with about FIDO at enrollment and login
We also gave the audience a detailed look at LoginWithFIDO.com and how you can consider using it for your own educational initiatives around FIDO. You’ll learn:
--How to navigate through the microsite and its two landing pages
--How you can reference the site and its materials for your own offerings and deployments
--Added insights into how to utilize FIDO’s consumer-facing marks
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
With 50,000 employees and more than a billion users, security and privacy are of critical importance to the Internet giant, Google. Two years ago, they set out with the goal of improving authentication through stronger security, increasing user satisfaction and lowering support costs. In that time, Google deployed FIDO Certified ® security keys. A detailed analysis by this data-driven company has demonstrated clear confirmation of how well FIDO’s approach is suited to making stronger, simpler authentication for employees and consumers.
FIDO, Federation and the Internet of ThingsFIDO Alliance
Learn how FIDO-based authentication can complement federated authentication - and why they are better together.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
FIDO UAF (Universal Second Factor Framework) Specifications: Overview & Tutorial
by Todd Thiemann, Nok Nok Labs
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Strong Authentication Trends in GovernmentFIDO Alliance
The new model for stronger, simpler online authentication has implications beyond businesses and their consumers, including government policy and applications. FIDO authentication was designed with security and privacy at the forefront, making it a natural complement for government initiatives in these areas. Explore FIDO's role in policy, what the Alliance is doing in policy and how governments are working to implement FIDO authentication.
This Japanese-language presentation from the FIDO Alliance Japan Working Group covers the representation of major Japanese technology companies in the Alliance and the progress of the Alliance in general, along with the Working Group.
Reduce Friction and Risk with Device AuthenticationTransUnion
To view the recorded presentation, click here: https://www.iovation.com/resources/webinars/reduce-friction-and-risk-with-device-authentication
Device-based authentication uses your customers’ own devices to verify their identity. This protects your business from identity and payment fraud schemes that lead to account takeover. It also works without adding customer friction, creating a better overall customer experience.
iovation’s authentication technology uses strong device recognition independent of cookies, across desktop and mobile devices. It can be applied at login or any point your customer interacts with your online business.
Learn about a convenient and secure alternative to passwords that also protects consumers privacy on their mobile phones.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCloudIDSummit
Dirk Balfanz, Goooogle
Motivation for U2F, demo of its use, explanation of the user privacy and security properties of the protocols involved, explanation of the state of browser support for U2F, and delving into some of the details of the APIs.
Introduction to the FIDO Alliance: Vision and StatusFIDO Alliance
Introduces FIDO Authentication: the problem, the solution, the Alliance and the market. Presented by Brett McDowell, Executive Director of the FIDO Alliance.
Introduces FIDO Authentication: the problem, the solution, the Alliance and the market. Presented by Brett McDowell, Executive Director of the FIDO Alliance.
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
The ForgeRock Identity Platform and Edge security solution can turn any IoT device into a secure, trusted active subject enrolled and on-boarded from a hardware based root of trust to become an autonomous entity in your business relationship eco system represented by a digital twin.
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
Explore how FIDO UAF works, how to perform FIDO registration, and how FIDO is used in the world today, as well as the process from start to finish of UAF authentication.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
CIS14: An Overview of FIDO's Universal Factor (UAF) SpecificationsCloudIDSummit
Rolf Lindemann,
Nok Nok Labs
Introduction to the UAF protocol, which is designed to provide a “passwordless” experience, discussing potential use cases and implementation models, with a real-world example shown via the FIDO client on the Samsung Galaxy S5.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
By Steve Ferris SVP Global Customer Success, ForgeRock, Alain Barbier Principal Customer Engineer, ForgeRock, Leonard Moustacchis Senior Customer Engineer, ForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Basics of how FIDO protocols work, how they fit into the broader identity ecosystem, the benefits of the design and the state of implementation/deployment in the market; appropriate for both technical and non-technical individuals, giving orientation before diving into the details of the specific FIDO protocols.
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
Explore how FIDO UAF works and how FIDO is used in the world today.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
The important role that mobile identity & authentication will have on the deployment and growth of conversational & messaging interfaces & the impact that it will have for brands & improve customer interaction.
Mobilize your workforce with secure identity servicesSumana Mehta
Active Directory-Based Authentication for Mobile Apps
Centrify partner program provides mobile application developers with a free, easy-to-deploy solution for integrating their apps with Active Directory and delivering 'Zero Sign-On' to enterprise users
Centrify Mobile Authentication Services (MAS) and Software Developer Kit (SDK) delivers the first cloud-based solution that enables Active Directory-based authentication for mobile applications. With a simple, high-level API, developers can easily add Centrify's unique "zero sign-on" authentication and authorization services to their multi-tier applications, from the mobile device seamlessly through to their existing back-end infrastructure. Centrify's Mobile Authentication Service adds a critical capability not available in existing Mobile Device Management offerings, yet it is compatible with any existing MDM solution, including Centrify's mobile security management solution, to enable a comprehensive mobile security solution.
http://www.centrify.com/mobile/mobile-authentication-services.asp
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCloudIDSummit
Just as the IoT demands interoperability at the network and application layer, for it to reach its hoped for scale and ubiquity it also demands ‘identity interoperability’, i.e. the ability for things and applications to be able to discover, authenticate and trust devices with identities that are managed elsewhere.
OAuth 2.0 and OpenID® Connect 1.0 are two authentication and authorization standards that, while not developed specifically with the IoT in mind, promise to serve as important tools for the IoT’s authentication and authorization requirements—enabling a standardized interoperable identity layer for the IoT.
In this presentation I'll argue the relevance of these identity standards to the IoT by exploring how they fit into a representative IoT wearable architecture
Las organizaciones necesitan evolucionar más allá del nombre de usuario y contraseña básico y asegurar las transacciones en línea con un abanico de opciones de autenticación segura.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
David McNeely, Centrify
Sumana Annam, Centrify
In-depth discussion that clearly outlines the common challenges faced by enterprises as they attempt to mobilize their existing applications, with explanation of the many
technical considerations that organizations must address, how they can ensure user authentication and productivity by locking mobile users to a single corporate identity across all applications, and code changes that organizations need to consider.
Three trends are changing the calculus of authentication: Increased use of modern identity proofing broader adoption of adaptive authentication, and local mobile biometrics.
Similar to FIDO & Strong Authentication Technology Landscape (20)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
8. Local authentication
• Capabilities of phones also make
practical a model the verification
check is performed locally, ie on
the device
• Result of local verification on
device communicated to server
(typically via demonstration of
knowledge of a previously
established secret)
• Evolution of ‘device unlock’
mechanisms, e.g. PIN or pattern
• Particularly for biometrics,
advantages to keeping sensitive
secrets off the server
10. Authenticating device & user
yes
no
Is device authenticated?
no
yes
User
authenticated?
Enjoy
partial
application
access
Enjoy full
application
access
Device
Registration
User logs in
from
untrusted
device.
User logs
out
User logs in
from
trusted
device.
Enjoy
partial
application
access
Enjoy
limited
application
access
17. Complementary
• Insulates authentication
server from specific
authenticators
• Focused solely on primary
authentication
• Does not support attribute
sharing
• Can communicate details of
authentication from device
to server
• Insulates application from
specific identity providers
• Does not address primary
authentication
• Does enable secondary
authentication & attribute
sharing
• Can communicate details of
authentication from IdP to SP
FIDO Federation
Being able to authenticate both device & user is powerful model
Some use this term only for login assessments, some use this as a general term both for login and post-login assessments. Some use this term for the traditional online fraud detection (OFD) tools, some use also for enterprise remote access for partners and the workforce.