Check out Jim Theodoras' slides from a panel he participated in at OFC 2014 this week, as he digs into network security and looks at what opportunities there might be for quantum technologies in the future
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit
Speaker: Michael Allen
The early Accumulo developers made security a core part of Accumulo's codebase. As the open source community around Accumulo continues to thrive, this talk examines the current state of Accumulo's security features. The talk will detail some exciting developments in the upcoming 1.6 release, which include enhancements around encryption at rest and in motion. We will also take a broader look at new use cases suggesting a wider set of threats, and how current and future work addresses those threats.
From Mirai to Monero – One Year’s Worth of Honeypot DataDefCamp
Adrian Hada and Mihai Vasilescu in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The slides and other presentations can be found on https://def.camp/archive
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
Running Secure Server Software on Insecure Hardware without a Parachute - RSA...Nick Sullivan
In this session we will look in depth into what happens when we throw away the assumption that server hardware is trusted. We discuss advanced techniques for protecting software on untrusted clients and how to apply them to servers running on untrusted hardware. This includes anti-reverse engineering methods, secure key management and how to design a system for renewal.
OVHcloud Startup Program : Découvrir l'écosystème au service des startups OVHcloud
L’équipe de l’OVHcloud Startup Program France Benelux a organisé, le 05 janvier dernier, son premier meetup online de l’année.
Le premier d’une longue série !
Cette première session, animée par Fanny Bouton, Startup Program Leader France Benelux, était l’occasion de découvrir toute l’ampleur de l’écosystème OVHcloud au service des startups au travers de l’OVHcloud Marketplace, l’Open Trusted Cloud Program ou encore avec l’OVHcloud Partner Program.
Ce rendez-vous a permis d’échanger directement avec l’ensemble des Program Leaders d’OVHcloud ainsi que nos partenaires tels que La BigAddress, Freelance Stack ou encore SmartGlobal.
Accumulo Summit 2014: Past and Future Threats: Encryption and Security in Acc...Accumulo Summit
Speaker: Michael Allen
The early Accumulo developers made security a core part of Accumulo's codebase. As the open source community around Accumulo continues to thrive, this talk examines the current state of Accumulo's security features. The talk will detail some exciting developments in the upcoming 1.6 release, which include enhancements around encryption at rest and in motion. We will also take a broader look at new use cases suggesting a wider set of threats, and how current and future work addresses those threats.
From Mirai to Monero – One Year’s Worth of Honeypot DataDefCamp
Adrian Hada and Mihai Vasilescu in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The slides and other presentations can be found on https://def.camp/archive
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
Running Secure Server Software on Insecure Hardware without a Parachute - RSA...Nick Sullivan
In this session we will look in depth into what happens when we throw away the assumption that server hardware is trusted. We discuss advanced techniques for protecting software on untrusted clients and how to apply them to servers running on untrusted hardware. This includes anti-reverse engineering methods, secure key management and how to design a system for renewal.
OVHcloud Startup Program : Découvrir l'écosystème au service des startups OVHcloud
L’équipe de l’OVHcloud Startup Program France Benelux a organisé, le 05 janvier dernier, son premier meetup online de l’année.
Le premier d’une longue série !
Cette première session, animée par Fanny Bouton, Startup Program Leader France Benelux, était l’occasion de découvrir toute l’ampleur de l’écosystème OVHcloud au service des startups au travers de l’OVHcloud Marketplace, l’Open Trusted Cloud Program ou encore avec l’OVHcloud Partner Program.
Ce rendez-vous a permis d’échanger directement avec l’ensemble des Program Leaders d’OVHcloud ainsi que nos partenaires tels que La BigAddress, Freelance Stack ou encore SmartGlobal.
Brochure informativa per il progetto aziendale di restauro del Castello di Parella e di ripresa economica dell'area limitrofa.
Sviluppo dei contenuti, del layout, ricerca delle immagini e impaginazione.
CipherCloud's Searchable Strong Encryption (SSE), FIPS 140-2 validated, delivers the benefits of the cloud, while assuring cloud data security and compliance for your most sensitive information.
Trustleap - Mathematically-Proven Unbreakable SecurityTWD Industries AG
Acknowledging the need for certainty, this document explains why standard cryptography fails - and how TrustLeap makes the encryption standards provably safe.
Our ConnectGuard™ solution has been specifically engineered to deliver the most robust network security available. It’s time to embrace a new era of data protection.
Overcoming the Challenges of Architecting for the CloudZscaler
The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures. What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users?
Watch this webcast to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Michael Appelby: Why the protection of information is critical for our society
http://www.infinit.dk/dk/nyheder-og-reportager/cyber-security-4-0-reportage.htm
Jon Longstaff looked at the recent attacks on Ukraine power stations and talked about the security implications of IoT devices in industry and how to secure them.
This slideshare was originally presented at the East Midlands Cyber Security Forum's Summer event on 6th June 2017 at University of Nottingham.
https://emcsf.org.uk/
Brochure informativa per il progetto aziendale di restauro del Castello di Parella e di ripresa economica dell'area limitrofa.
Sviluppo dei contenuti, del layout, ricerca delle immagini e impaginazione.
CipherCloud's Searchable Strong Encryption (SSE), FIPS 140-2 validated, delivers the benefits of the cloud, while assuring cloud data security and compliance for your most sensitive information.
Trustleap - Mathematically-Proven Unbreakable SecurityTWD Industries AG
Acknowledging the need for certainty, this document explains why standard cryptography fails - and how TrustLeap makes the encryption standards provably safe.
Our ConnectGuard™ solution has been specifically engineered to deliver the most robust network security available. It’s time to embrace a new era of data protection.
Overcoming the Challenges of Architecting for the CloudZscaler
The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures. What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users?
Watch this webcast to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Michael Appelby: Why the protection of information is critical for our society
http://www.infinit.dk/dk/nyheder-og-reportager/cyber-security-4-0-reportage.htm
Jon Longstaff looked at the recent attacks on Ukraine power stations and talked about the security implications of IoT devices in industry and how to secure them.
This slideshare was originally presented at the East Midlands Cyber Security Forum's Summer event on 6th June 2017 at University of Nottingham.
https://emcsf.org.uk/
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
This presentation part of Prisma CSI's Practical White Hat Hacker Training v1
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
At PTTI 2023, our team, led by Patrick Berthoud, discussed our industry-first high-performance optical cesium atomic clock technology. This cutting-edge solution offers unparalleled levels of precise synchronization and stability.
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
Critical network infrastructure is increasingly dependent on precise synchronization and timing. As operators address this need by adding GNSS receivers across their geographically dispersed networks, their infrastructure becomes more and more vulnerable to jamming and spoofing attacks. At PTTI, Nino De Falcis explained how GNSS/GPS-backup-as-a-service (GBaaS) makes timing networks independent from GNSS. With GBaaS, a specialized service provider operates a robust and reliable network, delivering precise and secure timing to critical infrastructure as a backup to highly vulnerable GNSS.
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
Our new OSA 3350 SePRC™ offers unprecedented protection for critical network infrastructure systems that rely on synchronization from GNSS. It delivers extensive timing holdover with high-performance stability and lifetime that significantly outperforms any other solution on the market.
Addressing PNT threats in critical defense infrastructureADVA
PNT threats are at an all-time high, creating unprecedented operational risk to defense information systems and more. Learn how to combat these threats from our GPS World Webinar slides.
Precise and assured timing for enterprise networksADVA
At ITSF 2022, Jeremy Thomas discussed the evolution and future of timing and resilience in enterprise infrastructure, exploring how enterprise sync networks can operate securely and meet the latest standards and regulations.
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
Our new Ensemble Cloudlet is a direct response to the growing demand for on-premises cloud solutions. It empowers enterprises to harness edge computing to meet requirements for low latency, enhanced security and improved resilience. For CSPs, Ensemble Cloudlet creates an entirely new use case for uCPE. It enables them to offer customers an easily scalable edge cloud with localized control.
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
Accurate timing is essential for effective operations in today’s data centers. An ePRTC synchronization source can offer the levels of precise synchronization required and remove vulnerability to GNSS outages. With the latest optical timing channel (OTC) technology, PTP-optimized optical transport can be used to distribute accurate timing all the way from the core of the network to the edge. What’s more, this can be delivered through GNSS/GPS-backup-as-a-service (GBaaS), whereby a specialized service provider operates a robust and reliable network, supplying precise and secure timing as a backup to highly vulnerable GNSS. In his ITSF 2022 presentation, Igal Pinhasov explored the value of utilizing GBaaS to provide accurate time for data centers using optical timing channel technology over long distances.
Sync on TAP - Syncing infrastructure with softwareADVA
At ITSF 2022, Ken Hann discussed our new OSA SoftSync™ client software, which adds advanced PTP timing technology to server-hosted applications, and the OSA 5400 M.2, which brings precise timing to COTs servers or even virtual machines. The session outlined how, for a low total cost of ownership, OSA SoftSync™ creates an end-to-end synchronization architecture able to meet the needs of advanced time-critical services. This will be invaluable for 5G, financial institutions, data center networks and other time-critical applications.
Meet stringent latency demands with time-sensitive networkingADVA
Our FSP 150-XG418 multi-layer 100Gbit/s demarcation device now features time-sensitive networking (TSN) capabilities. The upgraded solution actively uses technologies that minimize latency and reduce jitter. This is key for supporting time-sensitive applications that demand fast, reliable and secure connectivity, including 5G fronthaul, video/audio bridging and industrial automation.
Making networks secure with multi-layer encryptionADVA
Stephan Lehmann's NetNordic session discussed the most effective encryption methods for safeguarding external network connections against unauthorized access. He debated how the latest technology for encryption at multiple layers can provide a comprehensive state-of-the-art security infrastructure for all connectivity applications, and explored how new solutions are ensuring that data is encrypted without impacting network performance.
Quantum threat: How to protect your optical networkADVA
At NetNordic, Vincent Sleiffer explored the looming quantum threat and asked whether there are quantum-safe network technologies that can be applied today to protect sensitive information against dangers including data harvesting.
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
At ECOC 2022, Klaus Grobe's discussed greening by ICT and where to focus sustainability efforts. His presentation outlined the big picture, asking how long exponential growth can continue and how the optical telecommunication industry can make a real difference.
Trends in next-generation data center interconnects (DCI)ADVA
In his session at ECOC 2022, Jörg-Peter investigated the development of next-generation data center interconnect technology, discussing topics such as pluggable transceivers vs. co-packaged optics, direct detect vs. coherent interfaces, and hyperscaler vs. enterprise data center solutions.
Open optical edge connecting mobile access networksADVA
Generic optics, developed for applications different from RANs, may not fit the requirements of the mobile transport network. Optical components natively conceived for radio access and based on technologies driven by its requirements (right optics at the right time and the right cost) would accelerate the pace at which RANs are deployed and decrease the relative cost of the optics as part of the total RAN solution. In this session, Jim Zou looked at how emerging innovation is enhancing networking energy efficiency. While today’s solutions focus on high-end performance and end user experience, tomorrow’s infrastructure must also balance energy efficiency with varying traffic loads, and designs focused on sustainability.
Introducing Adva Network Security – a trusted German anchorADVA
With its own secure facilities in Germany, Adva Network Security is a specialist security company committed to protecting mission-critical communication networks from cyberattacks. It will complement ADVA’s market-leading networking technology portfolio with proven and approved security controls that meet the highest industry requirements. Working in close collaboration with national security organizations, Adva Network Security will ensure end-to-end network protection for even the most mission-critical connectivity applications, including safeguarding data against quantum computer strikes.
Meet the industry's first pluggable 10G demarcation deviceADVA
Our NIDPlug+™ is the ideal solution for creating demarcation points in space-restricted locations. It's the industry's first pluggable 10Gbit/s demarcation SFP+ device specifically designed to enable high-speed services in the field where it’s not possible to use a traditional device. Consuming less than 2.5 watts and requiring no additional floor space, NIDPlug+™ provides enterprises and communication service providers with the comprehensive management capabilities needed to deliver strict SLA-based Carrier Ethernet.
Our pluggable AccessWave25™ answers the urgent need for higher bandwidth services in mobile X-Haul, cable access and wholesale networks. It gives operators an easy migration path from 10Gbit/s access infrastructure to 25Gbit/s connectivity without a significant increase in footprint or major changes to the existing optical layer. Slotting the AccessWave25™ into any standard-based SFP28 port delivers an instant capacity upgrade without replacing existing demarcation or aggregation devices. Using patent-pending distance optimization technology, the device also extends 25Gbit/s DWDM reach to 40km and its G.metro auto-tuning technology reduces provisioning efforts and simplifies operations.
Our highly versatile FSP 150-XO106 is a compact and temperature-hardened edge demarcation device that enables communication service providers to deliver 10Gbit/s Carrier Ethernet services in challenging environments. Easily mounted on walls, poles and cell towers and requiring no cabinet or cooling, it's ideal for deployment in space-restricted locations and harsh outdoor conditions. The feature-rich solution includes advanced OAM capabilities, supports precise synchronization and fully integrates with our Ensemble Controller and Packet Director for simple network management.
At Namex Annual Meeting 2022, Christoph Glingener discussed the threat that quantum computers pose to network security and talked about addressing this significant cybersecurity risk with quantum key distribution and post-quantum cryptography.
From leased lines to optical spectrum servicesADVA
With traffic demand growing exponentially and operator margins under extreme pressure, optical spectrum services provide a way to leverage the full value of optical network infrastructure assets. But how do current-generation optical line systems support transparent cross-border interconnection, and what opportunities arise from sharing optical spectrum resources internationally? At NGON & DCI World, Henning Hinderthür and Cornelius Fürst provided answers to these questions and more while demonstrating how extra value can be extracted from deployed networks by using a spectrum-as-a-service approach.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.