Presentation to the RIPE Anti-Abuse Working Group at RIPE63 in Vienna, November 2011. Covers adopting best practices to handle malware and other forms of network abuse for hosting providers and network operators
INFRAGARD 2014: Back to basics securityJoel Cardella
This talk focuses on getting Back To Basics with security controls. Too many enterprises are focusing on the wrong threats and spending money in the wrong places. Often overlooked are our basic security controls that require care and feeding, and regular review. This talk focuses on a few of those areas.
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
Vulnerability Management is more than patching your systems. A programmatic approach to risk reduction is critical, but often under-performing. This talk provides insight on how to implement a functional program.
The on-call survival guide - how to be confident on-call Raygun
Is being a developer on-call making you burned out? Are there a lack of systems in place to support you when there's a major outage? This slide deck will go though how to create an on-call system that works.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Corporate Disaster Prevention And Preparedness PowerPoint Presentation Slides SlideTeam
Presenting this set of slides with name - Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides. This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with thirty two slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. Utilize ready to use presentation slides on Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides with all sorts of editable templates, charts and graphs, overviews, analysis templates. It is usable for marking important decisions and covering critical issues. Display and present all possible kinds of underlying nuances, progress factors for an all inclusive presentation for the teams. This presentation deck can be used by all professionals, managers, individuals, internal external teams involved in any company organization.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
BruCon 2019 Keynote -=> My name is Rob Fuller, I've been around a bit, not as long as some but longer than others. From the US military to government contracting, consulting, large companies, tiny startups and silicon valley behemoths, from podcasting to television, I've had a storied and humbling career in infosec. Let’s get past complaining about blinky lights and users. Let’s talk about what actually works and what doesn't.
Building a Modern Security Engineering OrganizationZane Lackey
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering:
- Practical advice for building and scaling modern AppSec and NetSec programs
- Lessons learned for organizations seeking to launch a bug bounty program
- How to run realistic attack simulations and learn the signals of compromise in your environment
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
This presentation covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets.
Key take-aways:
* Integrating the 3 critical factors - people, processes & technology
* Saving time and money via automated tools
* Anticipating and overcoming common Vulnerability Management roadblocks
* Meeting security regulations and compliance requirements with Vulnerability Management
Every Time You Register a Domain Name With a Hyphen a Puppy DiesBlacknight
Choosing a good memorable domain name for your online business is important. You need to make sure that the name you choose is memorable, radio friendly and that people can spell it easily. Make sure to avoid names that can offend people. Make sure you control your domain name
INFRAGARD 2014: Back to basics securityJoel Cardella
This talk focuses on getting Back To Basics with security controls. Too many enterprises are focusing on the wrong threats and spending money in the wrong places. Often overlooked are our basic security controls that require care and feeding, and regular review. This talk focuses on a few of those areas.
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
Vulnerability Management is more than patching your systems. A programmatic approach to risk reduction is critical, but often under-performing. This talk provides insight on how to implement a functional program.
The on-call survival guide - how to be confident on-call Raygun
Is being a developer on-call making you burned out? Are there a lack of systems in place to support you when there's a major outage? This slide deck will go though how to create an on-call system that works.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Corporate Disaster Prevention And Preparedness PowerPoint Presentation Slides SlideTeam
Presenting this set of slides with name - Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides. This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with thirty two slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. Utilize ready to use presentation slides on Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides with all sorts of editable templates, charts and graphs, overviews, analysis templates. It is usable for marking important decisions and covering critical issues. Display and present all possible kinds of underlying nuances, progress factors for an all inclusive presentation for the teams. This presentation deck can be used by all professionals, managers, individuals, internal external teams involved in any company organization.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Reputation Guards. We are Reputation management agency specialised in reputation management services for individuals and reputation legal removal. Our Reputation management firm can suppress and remove negative links for you.
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
BruCon 2019 Keynote -=> My name is Rob Fuller, I've been around a bit, not as long as some but longer than others. From the US military to government contracting, consulting, large companies, tiny startups and silicon valley behemoths, from podcasting to television, I've had a storied and humbling career in infosec. Let’s get past complaining about blinky lights and users. Let’s talk about what actually works and what doesn't.
Building a Modern Security Engineering OrganizationZane Lackey
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering:
- Practical advice for building and scaling modern AppSec and NetSec programs
- Lessons learned for organizations seeking to launch a bug bounty program
- How to run realistic attack simulations and learn the signals of compromise in your environment
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
This presentation covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets.
Key take-aways:
* Integrating the 3 critical factors - people, processes & technology
* Saving time and money via automated tools
* Anticipating and overcoming common Vulnerability Management roadblocks
* Meeting security regulations and compliance requirements with Vulnerability Management
Every Time You Register a Domain Name With a Hyphen a Puppy DiesBlacknight
Choosing a good memorable domain name for your online business is important. You need to make sure that the name you choose is memorable, radio friendly and that people can spell it easily. Make sure to avoid names that can offend people. Make sure you control your domain name
Slides used during my presentation to EURALO on GDPR in February 2018.
Covering aspects of GDPR and how they relate to the business of a European based hosting provider and domain name registrar.
Slides from the webinar with Nominet held in November 2017 from the Nominet offices in Oxford.
Michele provided an overview of the key topics from ICANN Abu Dhabi that could impact registrars
Presentation given as part of a workshop at Indie Cork in October 2016. The presentation covers getting a domain name and building a website quickly and easily
How can you make hosting "sexy"? Selling and marketing hosting and other technical services can be hard. The technology isn't going to be of much interest to most of the target audience, so what kind of strategies can you adopt in your marketing and general positioning?
Presentation slides from INTA's annual meeting May 2016, Orlando, Florida. The deck is part of a larger panel presentation covering various aspects of how domains, new TLDs and ICANN can matter to trademark holders and other brand owners.
Presentation given at Showcase Ireland by Stephen Marron on online marketing and SEO. The presentation also gives a basic introduction to using a content management system (CMS) such as Wordpress to manage your site.
.irish and .ie are natural competitors in many respects. Both domain extensions serve the "Irish" market, but while one is very strictly controlled, the other is completely open.
Navigating in a sea of infinite choice. Challenges and opportunities with new TLDs. With hundreds and soon over a thousand top level domain names to choose from, which domain name(s) should people register? As a registrar or registry how should you market them? What do end users want? Is .com still king?
Business opportunities with domain namesBlacknight
Presentation on business opportunities with domain names, hosting and other services presented at the Dominios LatinoAmerica conference in Mexico City, Mexico, October 2014
Net Neutrality with puppies, dragons and cats ..
Net Neutrality has received a lot of media attention over the last few months. What's it about? Why should we care? What are the different elements? What is the impact?
Presentation given to UCD Law School students, February 12, 2014. Gives an overview of ICANN and its function / role within the internet governance context. Moves into the conflicts between ICANN's contracts + policies with local laws, specifically privacy
Presentation from Domain Forum 1 November 2013, Sofia, Bulgaria.
Covering some of the challenges and possible solution for marketing / selling new domain name extensions (new TLDs)
ICANN is a California based corporation yet it enters into binding contracts with companies all over the world.
Some of the contractual requirements may be in direct conflict with national law, so how do you strike the balance
Presentation slides on "Hosting in a Global Village". Part of the "Globalisation Afternoon" held at Carlow's Institute of Technology on October 22 2013.
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightBlacknight
Presentation on the practical aspects of the EU Cookie Law in Ireland (Statutory Instrument Number 336 of 2011 European Communities (Electronic Communications Networks and Services)(Privacy and Electronic Communications) Regulations 2011) given to the Ir
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
5. BLACKNIGHT
Security Issues / Abuse are not going away
Apathy is NOT an option
Self-regulation vs Regulation + govt
intervention
Image / brand / reputation => You value them,
don’t you?
7. BLACKNIGHT
Self-regulation => control remains with
industry => retain control of destiny
Govt. Regulation => industry input possibly
ignored => lose control of destiny
9. BLACKNIGHT
Abuse desk best practices => not rocket
science
No need to think – someone’s already
developed some
StopBadware (http://stopbadware.org/best-
practices/web-hosting-providers)