Symosis mobile application security risks presentation at ISACA SV. The presentation top 3 covers mobile application security risks and helps you prioritize your risk remediation efforts
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Tips and Tricks for Building Secure Mobile AppsTechWell
Mobile application development is now a mission-critical component of IT organizations and a big part of software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However, many application developers and testers do not understand how to build and test secure mobile applications. Jeffery Payne discusses the risks associated with mobile platforms/applications and describes proven practices for ensuring the safety of your mobile applications. Jeffery delves into the unique nuances of mobile platforms and how these differences impact the security approach when you are developing and testing mobile applications. Topics include session management, data encryption, securing legacy code, and platform security models. Learn what to watch out for when you start developing your next mobile app and take away tips and tricks for effectively securing and testing existing apps.
This webinar by Endeavour's Technology Consulting group provides insights on Enterprise Security & android platform.
Data and transaction security has become of paramount importance with increase in mobile application usage in enterprises. The challenges of the security issues faced have become a top priority in every enterprise. Businesses and IT departments are experiencing employees opting for Android phones as corporate communication tools over other Smartphone as they offer powerful apps and innovative hardware specs.
2012 State of Mobile Survey Global Key FindingsSymantec
Symantec’s 2012 State of Mobility Survey revealed a global tipping point in mobility adoption. The survey highlighted an uptake in mobile applications across organizations with 71 percent of enterprises at least discussing deploying custom mobile applications and one-third currently implementing or have already implemented custom mobile applications.
Understand the requirements for protecting mobile apps, including internally developed apps and third-party apps. This presentation describes security, compliance, and auditing challenges for banking and financial institutions and how virtual mobile infrastructure (VMI) can help solve them.
Here are some Guidelines for CxO's relating to BYOD / Mobile-Device Security at work. Includes some recent Statistics and other Research on the Market.
Mobile Security for Smartphones and TabletsVince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
Simplifying BYOD deployments while satisfying HIPAA and other healthcare regulations. Virtual Mobile Infrastructure with strong biometric authentication and 4096-bit encryption. Android-based VDI for mobile security.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Tips and Tricks for Building Secure Mobile AppsTechWell
Mobile application development is now a mission-critical component of IT organizations and a big part of software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However, many application developers and testers do not understand how to build and test secure mobile applications. Jeffery Payne discusses the risks associated with mobile platforms/applications and describes proven practices for ensuring the safety of your mobile applications. Jeffery delves into the unique nuances of mobile platforms and how these differences impact the security approach when you are developing and testing mobile applications. Topics include session management, data encryption, securing legacy code, and platform security models. Learn what to watch out for when you start developing your next mobile app and take away tips and tricks for effectively securing and testing existing apps.
This webinar by Endeavour's Technology Consulting group provides insights on Enterprise Security & android platform.
Data and transaction security has become of paramount importance with increase in mobile application usage in enterprises. The challenges of the security issues faced have become a top priority in every enterprise. Businesses and IT departments are experiencing employees opting for Android phones as corporate communication tools over other Smartphone as they offer powerful apps and innovative hardware specs.
2012 State of Mobile Survey Global Key FindingsSymantec
Symantec’s 2012 State of Mobility Survey revealed a global tipping point in mobility adoption. The survey highlighted an uptake in mobile applications across organizations with 71 percent of enterprises at least discussing deploying custom mobile applications and one-third currently implementing or have already implemented custom mobile applications.
Understand the requirements for protecting mobile apps, including internally developed apps and third-party apps. This presentation describes security, compliance, and auditing challenges for banking and financial institutions and how virtual mobile infrastructure (VMI) can help solve them.
Here are some Guidelines for CxO's relating to BYOD / Mobile-Device Security at work. Includes some recent Statistics and other Research on the Market.
Mobile Security for Smartphones and TabletsVince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
Simplifying BYOD deployments while satisfying HIPAA and other healthcare regulations. Virtual Mobile Infrastructure with strong biometric authentication and 4096-bit encryption. Android-based VDI for mobile security.
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Mobile Security Training course will investigate endeavor mobile security and show you the mobile security shortcomings and dangers. Figure out how assailants can use mobile gadgets to mishandle and assault associations. We indicate you different mobile security concerns, specialized issues with mobile stages, remediation techniques, security strategies, and arrangements on assortment of mobile gadgets, savvy gadgets and stages including iOS (iPhone and iPad), Android, Blackberry and Windows Phone.
#Learn more about:
Application Security and SDLC Fundamentals
Mobile networks and technologies
Mobile threat models
Mobile Device Management (MDM) and BYOD
Secure Java, C# and Objectives C coding
iOS and Android SDK, APIs, and Security Features
Web Service and Network Security
Data Security and Implementing Encryption
Application hardening and reverse engineering
#Who Should Attend?
This class is recommended for mobile device manufacturers, application developers, mobile network operators, software companies, special ops, covert ops personnel, FBI, CIA, NSA, DoD offensive security professionals, and other professionals from the Intel community.
Mobile Security Training Topics Include:
Mobile device overview
Mobile device characteristics
Weaknesses in mobile phones
Overview of mobile networks
GSM, CDMA, UTMS/HSPA/HSPA+, LTE, LTE-Advanced and WiFi Network and Security features and architecture
High-Level threats and vulnerabilities
Physical security controls
Exploit tools and attacks againstt mobile devices
Mobile devices and security infrastructures
iOS, Android, Blackberry and Windows Phone environment: emulator/sdk/hardware/
Basics concepts of reverse engineering mobile applications
Exploiting mobile applications
Attacking web applications, and web services
Decompiling and reversing Apps
Fuzzing Android Apps
Web App/Web Service Testing
Working with SQLite Manager
Learn more about Mobile Device Security Training
https://www.tonex.com/training-courses/mobile-security-training/
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
Virtual Mobile Infrastructure can save upto 75% in BYOD budgets compared to VDI, MDM and other complicated last generation solution. Avoid expensive Microsoft RDSH CAL and Server Licenses by migrating to VMI. Achieve Enterprise Mobility and Mobile Security with a hosted Remote Mobile App. With support for HTML5, iOS, Blackberry and Android cover all your user needs easily.
This talk will be focused on how to develop secure mobile apps. We will look into specifics regarding mobile development and what are the best practices.
We will make an emphasis on all issues affecting the mobile platform such as protocols, secure storage, secrets, caching, logging, etc.
Developing, managing and securing mobile apps can be a long and grueling process. This infographic lays out the obstacles that organizations often encounter and explains how Virtual Mobile Infrastructure can provide a shortcut to BYOD success.
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
The mobile banking and payments opportunity for financial institutions is tremendous, and those who offer the most secure apps will prevail over the competition. But this opportunity is not without hazards, and the effect on revenue and brand caused by hackers can be devastating.
In this webinar, IBM Security Trusteer and Arxan focuson the mobile threat landscape and leading protection techniques to safeguard mobile payments and apps.
Industry experts from IBM Security Trusteer and Arxan review:
The changes in technology that have made mobile applications so vulnerable
Emerging mobile threat vectors and what you can do to mitigate the risks
Musts for the future of your security model
View the on-demand recording: http://arxan.wistia.com/medias/036z0iw7y1
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Mobile Security Training course will investigate endeavor mobile security and show you the mobile security shortcomings and dangers. Figure out how assailants can use mobile gadgets to mishandle and assault associations. We indicate you different mobile security concerns, specialized issues with mobile stages, remediation techniques, security strategies, and arrangements on assortment of mobile gadgets, savvy gadgets and stages including iOS (iPhone and iPad), Android, Blackberry and Windows Phone.
#Learn more about:
Application Security and SDLC Fundamentals
Mobile networks and technologies
Mobile threat models
Mobile Device Management (MDM) and BYOD
Secure Java, C# and Objectives C coding
iOS and Android SDK, APIs, and Security Features
Web Service and Network Security
Data Security and Implementing Encryption
Application hardening and reverse engineering
#Who Should Attend?
This class is recommended for mobile device manufacturers, application developers, mobile network operators, software companies, special ops, covert ops personnel, FBI, CIA, NSA, DoD offensive security professionals, and other professionals from the Intel community.
Mobile Security Training Topics Include:
Mobile device overview
Mobile device characteristics
Weaknesses in mobile phones
Overview of mobile networks
GSM, CDMA, UTMS/HSPA/HSPA+, LTE, LTE-Advanced and WiFi Network and Security features and architecture
High-Level threats and vulnerabilities
Physical security controls
Exploit tools and attacks againstt mobile devices
Mobile devices and security infrastructures
iOS, Android, Blackberry and Windows Phone environment: emulator/sdk/hardware/
Basics concepts of reverse engineering mobile applications
Exploiting mobile applications
Attacking web applications, and web services
Decompiling and reversing Apps
Fuzzing Android Apps
Web App/Web Service Testing
Working with SQLite Manager
Learn more about Mobile Device Security Training
https://www.tonex.com/training-courses/mobile-security-training/
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
Virtual Mobile Infrastructure can save upto 75% in BYOD budgets compared to VDI, MDM and other complicated last generation solution. Avoid expensive Microsoft RDSH CAL and Server Licenses by migrating to VMI. Achieve Enterprise Mobility and Mobile Security with a hosted Remote Mobile App. With support for HTML5, iOS, Blackberry and Android cover all your user needs easily.
This talk will be focused on how to develop secure mobile apps. We will look into specifics regarding mobile development and what are the best practices.
We will make an emphasis on all issues affecting the mobile platform such as protocols, secure storage, secrets, caching, logging, etc.
Developing, managing and securing mobile apps can be a long and grueling process. This infographic lays out the obstacles that organizations often encounter and explains how Virtual Mobile Infrastructure can provide a shortcut to BYOD success.
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
The mobile banking and payments opportunity for financial institutions is tremendous, and those who offer the most secure apps will prevail over the competition. But this opportunity is not without hazards, and the effect on revenue and brand caused by hackers can be devastating.
In this webinar, IBM Security Trusteer and Arxan focuson the mobile threat landscape and leading protection techniques to safeguard mobile payments and apps.
Industry experts from IBM Security Trusteer and Arxan review:
The changes in technology that have made mobile applications so vulnerable
Emerging mobile threat vectors and what you can do to mitigate the risks
Musts for the future of your security model
View the on-demand recording: http://arxan.wistia.com/medias/036z0iw7y1
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
Arxan Technologies, FS-ISAC, and IBM joined forces to deliver a presentation on how to protect your applications and data from emerging risks. This session will cover:
- The threat landscape regarding mobile payments
- How cybercriminals can hack your applications
- Comprehensive prevention and protection techniques
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
More and more organization employees are required to work outside the office using tablets, laptops and smartphones. These technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Mobile technologies collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. This webinar will discuss the risks faced by small to medium size organizations that require employees to work remotely. We will also discuss mitigation strategies.
1000+ Apps are released on Google Play and Appstore every day!
The most popular ones are downloaded
75 000 times a day.
There are many success factors that must be met for your app to be successful and one of these are trust
Cyber Security: A Hands on review on what is cyber security and how to prevent your devices from hacking and data breach. In today's era almost all devices are connected to internet are available for hackers to breach into and do their work. The data breach can be very dangerous and sometimes even more that it can demolish a company or a person.
In this presentation we will discuss about the ways and short description on Cyber Securty and Techniques.
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
A presentation by Commissioner Cavoukian to Telus Security Solutions on privacy risks inherent in mobile communications and how the positive-sum solution of Privacy by Design can mitigate those risks.
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
View on-demand: http://event.on24.com/wcc/r/1203107/AF33616D86CFB47663095958218D99E0
Being one step ahead of rapidly evolving, well-organized online cybercrime can seem like a losing battle. However, the key to success is combining sophisticated fraud detection with intelligent access management. Tightly uniting these capabilities in an open platform provides the flexibility to choose the appropriate authentication scheme for the various scenarios leveraging built-in biometrics, seamless authentication and mobile technologies. This smooths the access experience for legitimate users on web and mobile into a quick, frictionless authentication process while preventing fraudulent activity in real-time.
Join us in this IBM webinar where industry experts will discuss IBM’s approach on how to:
Detect fraudulent activity from stolen user credentials or a criminal device
Create risk-based access controls that reduce fraud while improving legitimate customers' activity
Speed deployment, improve business results and reduce cost of fraud protection with an integrated fraud protection gateway
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
Securing Your Digital Files from Legal ThreatsAbbie Hosta
Get ready to learn some immensely powerful tips and management approaches designed to safeguard your digital files firm from today’s growing cyber threats. Dive into Worldox technology and how it helps clients ensure compliance with ABA rules and protect your documents. We’ll offer practical guidance and strategies for Worldox users, law firm administrators, and IT managers looking to secure their documents and protect their sensitive client, business and employee information.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises.
View and listen to the entire webinar here:
http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
Similar to Mobile application securitry risks ISACA Silicon Valley 2012 (20)
Understand security and privacy threats in Mobile Health mHealth applications & environment
Evaluate if HIPAA compliance applies to my mHealth App and if it does how to comply
Integrate security due diligence during mHealth App Development
Assess risk and support compliance as health providers
A5 Security Imperatives For iOS & Android Apps DEMO
Kartik Trivedi, Co-Founder, Symosis
Clinton Mugge, Partner, Symosis
Understand emerging iOS and Android apps security threats
Learn how to design, develop and test secure apps
Protect against inadvertent customer and corporate data leakage in mobile apps
Mobile app security and privacy best practices from leading companies
Get free eval access to iOS/Android app top 10 security CBT
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
6. There is an App for that!
• Pay bills • Small Business Payroll
• File income taxes • Pay invoice
• Pay property tax • Location based check in
• Scan & Shop • Personal finance
• Deposit checks • Investments & 401k
• Transfer money • Health & Fitness
• Store medical records • Productivity
• Refill prescription • Facebook / twitter
• Manage health information • Place bets on sports
• Remember your meds • Utilities
• Book flight / hotel • Store passwords
• Medscape / pharmacopia • Document storage
6
9. Business Case for Mobile Presence
• Networking / communication - unprecedented level of
connectivity between employees, vendors, and/or
customers
• Instant Feedback - sharing information through this
medium allows businesses to get immediate feedback on
products and services from customers.
• Marketing - SMS (text) messaging, mobile websites, mobile
applications, banner ads, QR codes, IVR messaging and
more.
• Commerce – Mobile ticketing, vouchers, coupons, loyalty
cards, content purchase, delivery, location based
services, Information services, mobile banking, mobile
brokerage, mobile purchase
9
10. Security Concerns
• Side Channel Data Leakage • Activity monitoring and data retrieval
• Insufficient Transport Layer Protection • Unauthorized dialing, SMS, and payments
• Weak Server Side Controls • Unauthorized network connectivity (data
exfiltration or command & control)
• Insecure Data Storage
• UI (unique identifier) impersonation
• Client Side Injection
• System modification (rootkit, APN proxy
• Poor Authorization and
configuration)
Authentication
• Mobile Malware
• Improper Session Handling
• Criminals Target and Infect App Stores
• Security Decisions Via Untrusted
Inputs • Social-Engineering
• Geolocation compromise
• Broken Cryptography
• Security Regulatory Compliance
• Sensitive Information Disclosure
• Device Risk
• Hardcoded password/keys
• BYOD / MDM
• Privacy compliance
• Application management
• Identity exposure
• Installation of un-verified / unsigned 3rd
party apps
10
11. Agenda
Introduction
Growth / Revenue
Security Concerns
Mobile Apps Top 3 Risks
Side Channel Leakage
Insecure Transport / Server Controls
Insecure Data Storage
Countermeasures & Risk Management
11
12. Side Channel Data Leakage
Data leakage via platform defaults, use of third
party libraries, logging, etc
• SnapShot (ie- iOS backgrounding)
• Plist files
Sometimes result of programmatic flaws
16. Agenda
Mobile Platform Risks
Mobile Apps Top 3 Risks
Side Channel Leakage
Insecure Transport / Server Controls
Insecure Data Storage
Countermeasures & Risk Management
16
17. Insecure Transport/Server Controls
Failing to encrypt sensitive
network traffic consisting of
sensitive data
Insecure server controls -
web, application and
backend API - can lead to
security compromise
21. TOC
Mobile Platform Risks
Mobile Apps Top 3 Risks
Side Channel Leakage
Insecure Transport / Server Controls
Insecure Data Storage
Countermeasures & Risk Management
21
22. Insecure Data Storage
Locally stored data both on native and browser
based apps that includes
• SQLite / Cache files
• Keychain – Is this really secure?
22
25. Risk & Impact: High
Sensitive Data exposure
• Username & password
• PII, SSN, Health Information
• Device ID, Application configuration
• Account Number, Credit Card, Financial Information
Loss of Data Confidentiality & Integrity
Data Tempering
Man-in-the-Middle (MITM attack)
Impersonation
Unauthorized access to application data or
functionality
Privacy Violations / reputation damage
26. Agenda
Introduction
Mobile Apps Top 3 Risks
Insecure Data Storage
Insecure Transport / Server Controls
Side Channel Leakage
Countermeasures & Risk Management
Tactical
Strategic
26
27. Secure Programming / Education
Disable Cache - Set the autocorrectionType property to
UITextAutocorrectionNo for UITestField
Disable Snapshot – Use applicationWillResignActive
delegate method
Disable Logs – Disable NSLog and NSAssert
Disable Insecure HTTP - Use NSURLConnection along with
canAuthenticateAgainstProtectionSpace
27
28. Encrypt Data
Data Protection API - set the NSFileProtectionKey
on an existing file
Keychain – Apple recommends storing Sensitive
data like passwords and keys in the Keychain
CCCrypt - provides access to AES, DES, 3DES
SQLCipher (IOS & Android) - transparent
256-bit AES encryption of database files
28
29. Secure Design / Architecture
• Do not trust the client. Store sensitive data on the server
• Perform server side data validation and canonicalization
• Only collect and disclose data which is required for business
use of the application
• Define and deploy secure configuration
• Establish common set of security requirements
• Perform periodic security scans and audits
• Protect sensitive data using HTTPS & SSL
• Do not log credentials, PII and other sensitive data
• Review all third party libraries before use
29
31. Mobile Strategy & Challenges
• The are 3 major components of a mobile
strategy that most organizations have to apply
– Mobile Information Management(MIM)
– Mobile Application Management(MAM)
– Mobile Device Management(MDM)
31
32. MIM
• MIM refers to cloud-based services that syncs
files and documents across different devices
• MIM allows for sharing data of varying security
classification across devices with varying degrees
of trust
• MIM intersects Cloud and Mobile Security
• Public MIM services are Dropbox, Box, Microsoft
SkyDrive, GoogleDrive
• Corporate MIM solutions include
Monodesk, WatchDox, Citrix ShareFile, Vmware
Octopus
• NFC technologies could be classified as MIM 32
33. Security Challenges -MIM
• BYOD in corporate environments
• Potential synching of corporate data across both
corporate and non-corporate issued endpoints
• Sensitive bi-directional data leakage from user’s private
and personal data into corporate and vice-versa
• Access and Identity Management
• Data classification , identification and protection
• Difficult to apply and enforce any corporate security
configurations across mobile devices
• No existing virtual segregation capabilities for
corporate/user components to allow for different
security policies to be applied based on risk
33
34. MDM
• MDM involves downloading software that
allows users/organizations to lock down
• MDM allows controls like
monitoring, encryption, policy enforcement
, remote wiping etc..
• Addresses security at the device level as
opposed to the application level
• Especially challenging in BYOD era
• One policy regardless of varying classification
levels of applications on device
– Policies like remote wiping could adversely affect
user personal /private data
34
35. Security Issues-MDM
• Addresses security of device only
• Has little insight into security health of
applications
• Treats all applications and all data at the same
classification level
• Difficulties in adoption in corporate
environments that allows BYOD
• Does not affect or improve the security of
applications
35
36. MAM
• MAM solutions allow users and organizations
to control the security of specific applications
that are deployed on mobile endpoints
• MAM can allow an organization to deliver
applications like secure
email, calendar, expense reporting
• Allows security policies to be applied
exclusively on specific applications based on
their security classification
– Encryption, remote wipe, remote application kill
etc..
36
37. Security Issues-MAM
• MAM seems to have the answer for MIM’s
security challenges
• MAM should solve the BYOD challenges since it
allows for security policies to be applied to
corporate applications and their data and allows
for non-visibility into personal user information
• MAM solutions have several challenges:
– Rewrite secure versions of vendor
applications(functionality challenges)
– Allow vendors plug into their security platform
– Currently works only an a few apps
– Create a wrapper around vendor applications
(most vendors will not provide original packaged files to
wrap with MAM tools)
37
38. Mobile Security Convergence
MDM
All mobile security
strategies converge
on these
MIM approaches
MAM
Mobile Application Security
38
39. Thanks for listening…
kartik@symosis.com / Lenin.Aboagye@apollogrp.edu
Email info@symosis.com for a free seat to the Mobile
Apps Top 10 Security Risk Training Course
39
Editor's Notes
Please make a selection by clicking on the
Mobile App Growth
How consumers are evolving and changing their mobile behaviorhttp://www.pwc.com/us/en/industry/entertainment-media/publications/assets/consumer-research-series-smartphones.pdf
Mobile AppGrowth - http://www.appconomist.com/2011/08/01/fortune-500-apps-a-50-update/TransactionMarketingSMS / TXT MarketingNews AlertsTake a picture QR codes
Side channel data leakage applies to data leakage via platform defaults, use of third party libraries, logging, etc. In order to provide the visual iOS has been proven to capture and store snapshots.This occurs when a device suspends (rather than terminates), when either the home button is pressed, or a phone call or other event temporarily suspends the applicationPlist is a structured text file that contains essential configuration information for a bundled executable
A PLIST (Property List) file is an XML file that holds application properties. Some applications store sensitive information in the plist files including authentication credentials, PIN and oAUTH tokensPlist files can be found in several location in the application directory . An example location and plist file content storing sensitive authentication credentials are shown on the screen
Web sites and servers sometimes have improperly configured SSL certificates. This causes warning messages which are often ignored by the users. This results in users Phishing attacks where users end up providing personal information and private data to malicious websites that look like legitimate applicationsApplications that fall back or can be forced out of an encrypting mode can also be abused by attackers resulting in insecure communication. This is common on sites that operate on both HTTP and HTTPS services, or by the implementation of older versions of SSL on the web server that are vulnerable to downgrade attacks.
In 2011, it was discovered that Android devices transmitted data and AuthToken session cookie via insecure HTTP. AuthToken is not bound to any session or device and thus would allow an adversary to access any personal data which is made available through the service API. This includes Google calendar, picasa and contact information for that user. For more Reference: http://www.uni-ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.htmlThe issue here is the use of insecure HTTP channel which allows network eavesdropping of the authToken and user data
InsecureData Storage applies to the locally stored data by the mobile applications. There are two types of mobiles apps - native apps and browser based apps. Native apps are apps that is installed in the handset, processes data locally and may connect to the internet for updates or sending user specific information to the server. Example: Gaming apps, News apps, etc. Browser based apps are apps that are accessible via mobile browser. This vulnerability applies to both categories of apps.Most apps stores user specific information on mobile devices. This data may be stored in clear text and may includeUsername and passwordPII, SSN, Health InformationDevice ID, Application configurationAccount Number, Credit Card, Financial Information
Insecure transport layer protection is considered a high risk security vulnerabilityThe impact could includeLoss of Data Confidentiality & Integrity when sensitive information is revealed to the attackerData Tampering when attacker modifies application traffic and force user accept itMan-in-the-Middle (MITM attack) if an attacker diverts all traffic through an insecure channelImpersonation if the attacker hijacks user account
Please make a selection by clicking on the
Disable the auto-correct feature for any sensitive information, not just for password fields. Since the keyboard caches sensitive information, it may be recoverable. For UITextField, look into setting the autocorrectionType property to UITextAutocorrectionNo to disable caching. Set UITextField to OFF to prevent caching altogetherAdd an enterprise policy to clear the keyboard dictionary at regular intervals. This can be done by the end user by simply going to the Settings application, General > Reset > Reset Keyboard Dictionary