Whether you patch monthly or every six months, the time and resource overhead is significant.... And are you even secure?
In this real-life patch test, one of our Solution Architects put a simple virtual machine through it’s paces, with fascinating results. Understand more about typical vulnerabilities and security updates found in even the most simple of servers, learn about the typical decisions being faced by organisations trying to balance operational efficiency with security and see how you can implement same-day protection for vulnerabilities in critical systems, even without patching or during a change freeze.
This December Patch Tuesday attackers have added a smattering of coal to the gifts in our holiday stockings. You don’t want the Flash exploits slipping down the chimney while your back is turned, so make sure Adobe is on your list for maintenance goodies. Attackers could also turn the lights out on your holiday festivities via a Microsoft zero day and public disclosure, so prioritize those CVEs—and make sure you’ve checked off the other updates before shutting off the lights on 2018. Happy patching and happy holidays!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Happy New Year! Celebration continues in 2019 with a mild January Patch Tuesday. But, make sure you’ve deployed Microsoft’s emergency patch, released post December Patch Tuesday, so attackers with a New Year’s zero-day resolution don’t suck all the fun out of your month. Also, take note of the public disclosure, and take this calm before whatever comes next to catch up on Java support changes going forward. Java SE 8 will soon receive its last public update.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Merci de vous être inscrit à notre série de webinaires Patch Tuesday. Si vous avez pu vous joindre à nous ce mois-ci, nous espérons que cette présentation a été instructive. Si vous l'avez manqué, ou si vous souhaitez simplement revoir le contenu, les documents suivants sont désormais disponibles
This December Patch Tuesday attackers have added a smattering of coal to the gifts in our holiday stockings. You don’t want the Flash exploits slipping down the chimney while your back is turned, so make sure Adobe is on your list for maintenance goodies. Attackers could also turn the lights out on your holiday festivities via a Microsoft zero day and public disclosure, so prioritize those CVEs—and make sure you’ve checked off the other updates before shutting off the lights on 2018. Happy patching and happy holidays!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Happy New Year! Celebration continues in 2019 with a mild January Patch Tuesday. But, make sure you’ve deployed Microsoft’s emergency patch, released post December Patch Tuesday, so attackers with a New Year’s zero-day resolution don’t suck all the fun out of your month. Also, take note of the public disclosure, and take this calm before whatever comes next to catch up on Java support changes going forward. Java SE 8 will soon receive its last public update.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Merci de vous être inscrit à notre série de webinaires Patch Tuesday. Si vous avez pu vous joindre à nous ce mois-ci, nous espérons que cette présentation a été instructive. Si vous l'avez manqué, ou si vous souhaitez simplement revoir le contenu, les documents suivants sont désormais disponibles
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
May Patch Tuesday is the lightest we have seen in a while, but still brings a Zero Day exploit on the Adobe front and a fix for the Pwn2Own Exchange security feature bypass on the Microsoft front. Microsoft has resolved 55 vulnerabilities and Adobe resolved 14 in the Acrobat and Reader update. Microsoft Exchange Admins have had a rough stretch in the past few months starting with the zero day exploits in early march, followed by the April Exchange update resolving four NSA discovered vulnerabilities, and now the May update we are seeing the first of several vulnerabilities that were showcased in Pwn2Own getting to resolution. There are also several Windows 10 and Server branches getting their final round of updates this month so make sure your branch upgrades are caught up!
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesPriyanka Aash
Ever wondered how to find bug fixes residing in Microsoft patches? In this presentation we will take a look at the tools and techniques used to reverse engineer Microsoft security patches. Many organizations take weeks to push out patches to their domains. If an attacker can locate the fix and get a working exploit going, they can use it to compromise your organization.
(Source: RSA USA 2016-San Francisco)
If Equifax andThe Shadow Brokers were any indication, September Patch Tuesday drives home the fact that security concerns are alive and well this month. There are some Win10 public disclosures to attend to, and plenty of other Critical updates to go around—so let the update party commence! Plus, this month’s zero day serves as a reminder to limit admin rights in your environment as well.
Thomson Reuters manages three global sites with a mixed desktop environment. See their main drivers, security decisions and deployment methodology to scale virtual desktop deployments to 10,000 with capacity for 12,000 on a new infrastructure.
Trend Micro presents at The Future of Cyber Security 2012, Canary Wharf 19-Mar-12
In 2011, consumerization became main stream while APTs and cyber-attacks on physical infrastructure hit the front pages. So what about 2012? Increasingly sophisticated attackers will focus beyond the PC-centric desktop. Pressured IT teams will continue Virtualisation and Cloud initiatives while tackling concerns about security, resources and ROI. This session explains how to optimise defences across tomorrows' heterogeneous environments, while increasing efficiency.
In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments.
In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks.
This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012
The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But how secure is your data in the cloud and do conventional security products offer the optimal approach to securing your virtualised environments?
In this presentation we examine security and performance concerns along your journey to the cloud and explore new technologies from VMware and Trend Micro. These innovations are all ready helping thousands of businesses to address the security challenges with Physical, Virtual and cloud platforms.
Attacks are evolving and so must the response – but how? This presentation explores how you get beyond the APT hype and strike a sensible balance between security expenditure and commercial risk. We explain what do you need to just keep doing, what’s new and what’s no longer effective.
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
March is most definitely full of madness as Microsoft resolves 115 unique vulnerabilities! The good news is you can predict what to do much easier than your basketball picks. Patch the OS and browsers and you take care of 97 CVEs from the 115 contenders.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Rejoignez-nous ce mois-ci pour un récapitulatif des correctifs de sécurité Microsoft et d’applications tierces publiés à l’occasion du Patch Tuesday. Nous discuterons notamment des vulnérabilités à surveiller, des produits à tester et des correctifs à déployer en priorité.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
May Patch Tuesday is the lightest we have seen in a while, but still brings a Zero Day exploit on the Adobe front and a fix for the Pwn2Own Exchange security feature bypass on the Microsoft front. Microsoft has resolved 55 vulnerabilities and Adobe resolved 14 in the Acrobat and Reader update. Microsoft Exchange Admins have had a rough stretch in the past few months starting with the zero day exploits in early march, followed by the April Exchange update resolving four NSA discovered vulnerabilities, and now the May update we are seeing the first of several vulnerabilities that were showcased in Pwn2Own getting to resolution. There are also several Windows 10 and Server branches getting their final round of updates this month so make sure your branch upgrades are caught up!
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesPriyanka Aash
Ever wondered how to find bug fixes residing in Microsoft patches? In this presentation we will take a look at the tools and techniques used to reverse engineer Microsoft security patches. Many organizations take weeks to push out patches to their domains. If an attacker can locate the fix and get a working exploit going, they can use it to compromise your organization.
(Source: RSA USA 2016-San Francisco)
If Equifax andThe Shadow Brokers were any indication, September Patch Tuesday drives home the fact that security concerns are alive and well this month. There are some Win10 public disclosures to attend to, and plenty of other Critical updates to go around—so let the update party commence! Plus, this month’s zero day serves as a reminder to limit admin rights in your environment as well.
Thomson Reuters manages three global sites with a mixed desktop environment. See their main drivers, security decisions and deployment methodology to scale virtual desktop deployments to 10,000 with capacity for 12,000 on a new infrastructure.
Trend Micro presents at The Future of Cyber Security 2012, Canary Wharf 19-Mar-12
In 2011, consumerization became main stream while APTs and cyber-attacks on physical infrastructure hit the front pages. So what about 2012? Increasingly sophisticated attackers will focus beyond the PC-centric desktop. Pressured IT teams will continue Virtualisation and Cloud initiatives while tackling concerns about security, resources and ROI. This session explains how to optimise defences across tomorrows' heterogeneous environments, while increasing efficiency.
In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments.
In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks.
This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012
The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But how secure is your data in the cloud and do conventional security products offer the optimal approach to securing your virtualised environments?
In this presentation we examine security and performance concerns along your journey to the cloud and explore new technologies from VMware and Trend Micro. These innovations are all ready helping thousands of businesses to address the security challenges with Physical, Virtual and cloud platforms.
Attacks are evolving and so must the response – but how? This presentation explores how you get beyond the APT hype and strike a sensible balance between security expenditure and commercial risk. We explain what do you need to just keep doing, what’s new and what’s no longer effective.
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
March is most definitely full of madness as Microsoft resolves 115 unique vulnerabilities! The good news is you can predict what to do much easier than your basketball picks. Patch the OS and browsers and you take care of 97 CVEs from the 115 contenders.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Rejoignez-nous ce mois-ci pour un récapitulatif des correctifs de sécurité Microsoft et d’applications tierces publiés à l’occasion du Patch Tuesday. Nous discuterons notamment des vulnérabilités à surveiller, des produits à tester et des correctifs à déployer en priorité.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Rejoignez-nous ce mois-ci pour un récapitulatif des correctifs de sécurité Microsoft et d’applications tierces publiés à l’occasion du Patch Tuesday. Nous discuterons notamment des vulnérabilités à surveiller, des produits à tester et des correctifs à déployer en priorité.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Microsoft Exchange Server is top of mind for many organizations this March Patch Tuesday. The system count keeps rising for confirmed compromised on-prem Exchange Servers to the point where Microsoft extended update support to Cumulative Updates that were no longer supported. Bad news is updating the Exchange Server may not be enough. If your Exchange Server has already been compromised it must be rebuilt. Add in an Internet Explorer\Edge (HTML-based) Zero Day, a couple of Publicly Disclosed vulnerabilities and March Patch Tuesday could be a frustrating one.
Microsoft has released updates for the Windows OS, Office and O365, Exchange Server, Edge (Chromium), Visual Studio, Azure DevOps, Azure AD Web Sign-in, Azure Sphere, and many other components. A total of 110 unique vulnerabilities have been resolved this month including one Zero Day, and four publicly disclosed vulnerabilities. There are a lot of vulnerabilities being resolved this month. The good news is most of them are in the OS including the Zero Day and three of four of the Publicly Disclosed vulnerabilities. Knocking the OS out quickly will reduce a significant amount of risk for your organization. Top priorities this month should include the Windows OS, Edge (Chromium), and Exchange Server.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Mises à jour d'Apple pour macOS, iPad OS, iOS et Safari résolvant deux exploits Zero Day. Microsoft a publié des mises à jour résolvant 97 nouveaux CVE.
Nothing like starting off the new decade with rumors your computer cryptography has a vulnerability which can result in a lack of trust for almost everything you do! The reality is that this vulnerability has not been publicly disclosed nor exploited and our friends at Microsoft have a solution. Besides the Crypto vulnerability, the most notable news is still the final public patch release for Windows 7, Server 2008, and Server 2008 R2. Apply the updates soon; major security vulnerabilities are exploited quickly!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
o Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, there we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Similar to Real-life patch test - vulnerabilities found in one simple server in 6 months (20)
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Real-life patch test - vulnerabilities found in one simple server in 6 months
1. Vulnerabilities found in one server in 6 months
A real-life patch test
Copyright 2011 Trend Micro Inc.
2. Whether you
patch monthly…
Or every six months
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 2
3. Whether you
patch monthly…
Or every six months
The time and resource
overhead is significant
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 3
4. Whether you
patch monthly…
Or every six months
The time and resource
overhead is significant
And are you even secure?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 4
5. One of our Solution Architects
PATCH put a simple virtual machine
TEST through it’s paces… with
fascinating results…
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 5
6. 26 July 2011
Simple VM built with
WIN2008 R2 only… No
apps, no IIS, no SQL Server
This build could equally
apply to a physical server
Copyright 2011 Trend Micro Inc. 6
7. 6 months later…
A large number of updates
are available
Remember this is still only
one VM running nothing
more than WIN2008 R2
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 7
8. Look up the
Knowledge Base
number and find
the update
6 months Now the hard
later…
work begins….
A large number of updates
are available
Remember this is still only
one VM running nothing
more than WIN2008 R2
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 8
9. Take a closer look at the updates
09 AUG 2011… 7 important updates… 13.2MB… REBOOT REQUIRED
23 AUG 2011… 1 important update… 3.6MB… NO REBOOT
13 SEP 2011… 3 important updates… 65.4MB… NO REBOOT
11 OCT 2011… 4 important updates… 34.6MB… REBOOT REQUIRED
25 OCT 2011… 1 important update… 36K… NO REBOOT
08 NOV 2011… 2 important updates… 2.4MB… REBOOT REQUIRED
13 DEC 2011… 5 important updates… 26.1MB… REBOOT REQUIRED
29 DEC 2011… 3 important updates… 14.3MB… NO REBOOT
10 JAN 2011… 5 important updates… 19.1MB… REBOOT REQUIRED
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 9
10. A total of 31 important security
updates were announced over 6
RESULTS
months, with approx. every other
patch requiring a reboot
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 10
11. How can you reboot a
mission critical system
that cannot be taken offline?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 11
12. How can you reboot a
mission critical system
that cannot be taken offline?
How can you reboot
any system
during a CHANGE FREEZE?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 12
13. Significant cross-referencing and
assessment of each update needs to be
IMPACT undertaken by a skilled administrator.
What else will the update impact? What else is
vulnerable? What is the impact on our risk posture?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 13
14. Patch detail
Patch #1
Cumulative Security
Update for ActiveX Killbits
for Windows Server 2008
R2 x64 Edition
(KB2618451)
http://go.microsoft.com/fwli
nk/?LinkID=232507
ms11-090
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 14
15. Patch detail
Patch #1 PATCH #2
Cumulative Security Cumulative Security
Update for ActiveX Killbits Update for Internet
for Windows Server 2008 Explorer 9 for Windows
R2 x64 Edition Server 2008 R2 x64
(KB2618451) Edition (KB2618444)
http://go.microsoft.com/fwli http://go.microsoft.com/fwli
nk/?LinkID=232507 nk/?LinkID=232505
ms11-090 ms11-099
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 15
16. Patch detail
Patch #1 PATCH #2 PATCH #3
Security Update for
Cumulative Security Cumulative Security Microsoft .NET Framework
Update for ActiveX Killbits Update for Internet 3.5.1 on Windows 7 and
for Windows Server 2008 Explorer 9 for Windows Server 2008 R2 SP1 for x64-
R2 x64 Edition Server 2008 R2 x64 based Systems
(KB2618451) Edition (KB2618444) (KB2539635)
http://go.microsoft.com/fwli http://go.microsoft.com/fwli http://go.microsoft.com/fwlink
nk/?LinkID=232507 nk/?LinkID=232505 /?LinkID=218325
ms11-090 ms11-099 ms11-069
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 16
17. Patch detail
Patch #1 PATCH #2 PATCH #3
Security Update for
Cumulative Security Cumulative Security Microsoft .NET Framework
Update for ActiveX Killbits
for Windows Server 2008 WHICH WILL
Update for Internet
Explorer 9 for Windows
3.5.1 on Windows 7 and
Server 2008 R2 SP1 for x64-
R2 x64 Edition Server 2008 R2 x64 based Systems
(KB2618451)
http://go.microsoft.com/fwli
YOU PATCH??
Edition (KB2618444)
http://go.microsoft.com/fwli
(KB2539635)
http://go.microsoft.com/fwlink
nk/?LinkID=232507 nk/?LinkID=232505 /?LinkID=218325
ms11-090 ms11-099 ms11-069
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 17
18. Some hours later and all 31
security updates located and
assessed
23 out of 31 patches are
related to security
vulnerabilities
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 18
19. 1 VM, 1 OS, 31 patches
23 of which relate to security vulnerabilities
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 19
20. 1 VM, 1 OS, 31 patches
23 of which relate to security vulnerabilities
For a typical organisation with servers running 50
multiple operating systems and applications, this is
a costly and resource intensive operation
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 20
21. 1 VM, 1 OS, 31 patches
23 of which relate to security vulnerabilities
For a typical organisation with servers running 50
multiple operating systems and applications, this is
a costly and resource intensive operation
Unlike the simple VM, most organisations will not be
able to automatically install updates. Individual
updates or batches of updates will need to be tested
and deployed manually to allow for them to be
backed out in case of problems during installation.
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 21
22. How do you balance
operational efficiency
with security?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 22
23. How do you balance
operational efficiency
with security?
You want to install the minimum
number of security patches for
BASE LEVEL protection
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 23
24. How do you balance
operational efficiency
with security?
You want to install the minimum
number of security patches for
BASE LEVEL protection
But you want visibility of all security
vulnerabilities?
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 24
25. Virtual Patching: Proactively shield vulnerabilities
Solution in critical systems, even without patching
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 25
26. Trend Micro Deep Security
Virtual Patching Solution
Detects and blocks known and zero-day attacks that target vulnerabilities
Shields web application vulnerabilities
Increased visibility into, or control over, applications accessing the network
Fully integrates with VMware and provides visibility at the hypervisor
level, removing the risk of attacks not being visible within virtualised
environments
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 26
28. On the same VM running
WIN2008 R2
This screen shows results of
Trend Micro Deep Security
Recommendation Scan :
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 28
29. On the same VM running
WIN2008 R2
This screen shows results of
Trend Micro Deep Security
Recommendation Scan :
… After security updates
concerning local
logon, SSL protocol and
kernel were discounted…
…. Deep Security identified
and proactively shielded 13
security updates
… And then identified and
shielded a further 11
security updates for which
there may be no patches
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 29
30. Recommendations
Assess the effectiveness of your patch
1 management process
Calculate the cost and risk of emergency
2 patching
Request a demo of Trend Micro Deep Security
3 And see how virtual patching could reduce IT resources
and costs while enhancing the security and compliance of
your data centre applications
www.trendmicro.co.uk
01628 400552
Trend Micro Confidential 2/23/2012 Copyright 2011 Trend Micro Inc. 30