SlideShare a Scribd company logo
SEARCHING IN PRIVACY	

COPING WITH SURVEILLANCE
OVERVIEW
• Motivation	

• Types of privacy-enhanced search	

• Search by Example
MOTIVATION
• Use remote / untrusted storage for any data	

• Protect your data
REMOTE / UNTRUSTED
STORAGE
• What if you don’t trust the storage provider ?	

• Encrypt	

• What if you want to use a search provider
but don’t trust them ?	

• What if you want to search your encrypted data ?
WHAT IFYOU WANTTO SEARCH
YOUR ENCRYPTED DATA ?
Naïve approach: Server sends you everything
WHAT IFYOU WANTTO SEARCH
YOUR ENCRYPTED DATA ?
Can we do better ?
TYPES OF	

PRIVACY-ENHANCED SEARCH
• Private Information Retrieval (PIR)	

• Search on encrypted data
PRIVATE INFORMATION
RETRIEVAL (PIR)
• Server should not learn what you are looking for	

• Server may or may not have access to
searchable data
SEARCH ON	

ENCRYPTED DATA
• Server should not learn anything about your data	

• Especially not learn anything when you are
searching
ADDRESS BOOK MATCHING
Naïve approach	

• Normalize, then send to server
ADDRESS BOOK MATCHING
Naïve approach	

• Normalize, then send to server
JUST DON’T.
ADDRESS BOOK MATCHING
Better approach	

• Hash your data. Like WhatsApp, or Gravatar.	

• Still guessable (e-mail addresses)	

• Gravatar tracking	

• Still pre-computable (phone numbers)	

• Steal the database or match what you like
ADDRESS BOOK MATCHING
Hash (social) connections
• My phone number m, friend's number f	

• Hash: h(min(m, f), max(m, f))	

• Both ends must have the other contact in the
address book to match	

• Anybody can confirm your connections
ADDRESS BOOK MATCHING
Hash (phone # | e-mail) || (first | last name)
• Common names (e.g. John) still easily retrievable	

• Users have to enter their own name
(besides phone no.) for others to find them	

• Contacts must contain first name & last name
ADDRESS BOOK MATCHING	

BLOOM FILTERS
Setup
• Compute m-bit vector from k independent hash
functions with range [1…m] of all entries to match	

• Hashes need not be cryptographically secure,
just independent
ADDRESS BOOK MATCHING	

BLOOM FILTERS
1
1
1
h1(p) = i1
h2(p) = i2
h3(p) = i3
h4(p) = i4
1
……………
position i3
m bits
ADDRESS BOOK MATCHING	

BLOOM FILTERS
Properties:
• Never any false negatives	

• n insertions	

• Probability of bit = 0: (1 - 1/m)kn	

• False positive rate: (1 - e-kn/m)k
KEYWORD SEARCH	

SEARCHABLE SYMMETRIC KEY ENCRYPTION
Properties:
• Probabilistic search	

• False positives with probability 1/2
m
per word, i.e.
L/2
m
for a document with L words	

• n insertions	

• Probability of bit being zero: (1 - 1/m)
kn
	

• False positive rate: (1 - e
-kn/m
)
k
SSKE	

BASIC SCHEME
Setup
• Break document into L words W1...WL, either with	

• n bits (padded; leaks word count) or	

• with length information (leaks word & document lengths)	

• PRG (stream cipher with key k' that only client knows)	

• S1...SL with (n - m) bits each	

• Keyed PRF Fki(x) maps (n - m) bits to m bits
W1 W2 Wi WL… …
SSKE	

BASIC SCHEME
Setup
• Ti := Si || Fki(Si)	

• Ciphertext Ci := Wi ⊕ Ti	

• Send encrypted document to server
Si Fki(Si)
Wi
⊕ Ci
C1 C2 Ci CL… …
SSKE	

BASIC SCHEME
Search for keyword wj
• Tell server	

• wj	

• ki for all locations i (with Wi) to search
SSKE	

BASIC SCHEME
Search for keyword wj
• Server computes Ci ⊕ wj	

• If Ci ⊕ wj = s || Fki(s), yield s for all locations i	

• Client can decrypt s and check for false positives
SSKE	

BASIC SCHEME
Problems
• Linear search effort, inefficient for real-world
documents with different word lengths	

• Client reveals ki of searched subset and wj
SSKE	

BASIC SCHEME
Improvement
• Use PRG G to generate ki := GK(Wi), K secret key	

• Does not depend on i but only on K and Wi	

• Reveal wj and GK(wj) for lookup	

• Still reveals keyword wj
SSKE	

BASIC SCHEME
Second improvement: Setup
• Encrypt all words in document xi := Esk(Wi)	

• Split each word xi into Li with (n - m) and Ri with m
bits	

• Now generate ki := GK(Li)	

• Ci := xi ⊕ Ti
SSKE	

BASIC SCHEME
Search
• Tell server	

• xj	

• kj := GK(Lj)
QUESTIONS ?
REFERENCES
• https://whispersystems.org/blog/contact-discovery/	

• http://www.cs.berkeley.edu/~dawnsong/papers/
se.pdf	

• http://www.csd.uoc.gr/~hy590-82/lecture9-se.ppt	

• https://crypto.stanford.edu/~eujin/papers/
secureindex/2003nov-encsearch.pdf
IMAGE SOURCES
• http://www.cominvent.com/wp-content/uploads/2008/02/
dilbert-searchengine.gif	

• http://i3.asn.im/Overloaded-truck-_tshp.jpg	

• http://www.hairofthedogdave.com/wp/wp-content/
uploads/2008/11/yes-we-can.jpg	

• http://www.8-bitcentral.com/blog/2013/allMyHeart.html	

• https://oeilsj.files.wordpress.com/2011/02/nike_swoosh.gif

More Related Content

Viewers also liked

Coeffee Learning
Coeffee LearningCoeffee Learning
Coeffee Learning
trak15
 
дем’янюк світлана богданівна
дем’янюк світлана богданівнадем’янюк світлана богданівна
дем’янюк світлана богданівна
Svitlana Demyanyuk
 
Moooi heracleum by bertjan pot
Moooi heracleum by bertjan potMoooi heracleum by bertjan pot
Moooi heracleum by bertjan pot
opadlive
 
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing ProcessMicrosoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
Isra' Abu Rumman
 
Lactancia materna
Lactancia maternaLactancia materna
Lactancia materna
Giovanni Bortolini
 
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Nico Prakasa
 
Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors
Isra' Abu Rumman
 
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسساتERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
Isra' Abu Rumman
 
Teaching with questioning and answering method
Teaching with questioning and answering methodTeaching with questioning and answering method
Teaching with questioning and answering method
trak15
 
Motor listrik
Motor listrikMotor listrik
Motor listrik
Ady Frankenstein
 

Viewers also liked (11)

Coeffee Learning
Coeffee LearningCoeffee Learning
Coeffee Learning
 
дем’янюк світлана богданівна
дем’янюк світлана богданівнадем’янюк світлана богданівна
дем’янюк світлана богданівна
 
Moooi heracleum by bertjan pot
Moooi heracleum by bertjan potMoooi heracleum by bertjan pot
Moooi heracleum by bertjan pot
 
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing ProcessMicrosoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
 
makalah petir
makalah petirmakalah petir
makalah petir
 
Lactancia materna
Lactancia maternaLactancia materna
Lactancia materna
 
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
 
Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors
 
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسساتERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
 
Teaching with questioning and answering method
Teaching with questioning and answering methodTeaching with questioning and answering method
Teaching with questioning and answering method
 
Motor listrik
Motor listrikMotor listrik
Motor listrik
 

Similar to Searching in Privacy

Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
Gary Jan
 
NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersRob Fuller
 
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at ScaleCassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
DataStax Academy
 
Osint, shoelaces, bubblegum
Osint, shoelaces, bubblegumOsint, shoelaces, bubblegum
Osint, shoelaces, bubblegum
JamieMcMurray
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
Andrew Beard
 
CNIT 126 13: Data Encoding
CNIT 126 13: Data EncodingCNIT 126 13: Data Encoding
CNIT 126 13: Data Encoding
Sam Bowne
 
Test driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDBTest driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDB
Andrew Siemer
 
Neo4j Training Introduction
Neo4j Training IntroductionNeo4j Training Introduction
Neo4j Training Introduction
Max De Marzi
 
Introduction to Neo4j and .Net
Introduction to Neo4j and .NetIntroduction to Neo4j and .Net
Introduction to Neo4j and .Net
Neo4j
 
PHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptxPHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptx
Arulvincent3
 
20 security
20 security20 security
20 securityabiy2004
 
WLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WIWLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WI
Wisconsin State Cartographer's Office
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
Sam Bowne
 
Relational Database Design Bootcamp
Relational Database Design BootcampRelational Database Design Bootcamp
Relational Database Design Bootcamp
Mark Niebergall
 
DNSSEC Validation Tutorial
DNSSEC Validation TutorialDNSSEC Validation Tutorial
DNSSEC Validation Tutorial
APNIC
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymity
Hiroshi Nakagawa
 
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution PlansSqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
Marek Maśko
 
Intro to Cypher
Intro to CypherIntro to Cypher
Intro to Cypher
Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
 
Cryptography
CryptographyCryptography
Cryptography
PPT4U
 

Similar to Searching in Privacy (20)

Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for Pentesters
 
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at ScaleCassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
 
Osint, shoelaces, bubblegum
Osint, shoelaces, bubblegumOsint, shoelaces, bubblegum
Osint, shoelaces, bubblegum
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
 
CNIT 126 13: Data Encoding
CNIT 126 13: Data EncodingCNIT 126 13: Data Encoding
CNIT 126 13: Data Encoding
 
Test driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDBTest driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDB
 
Neo4j Training Introduction
Neo4j Training IntroductionNeo4j Training Introduction
Neo4j Training Introduction
 
Introduction to Neo4j and .Net
Introduction to Neo4j and .NetIntroduction to Neo4j and .Net
Introduction to Neo4j and .Net
 
PHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptxPHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptx
 
20 security
20 security20 security
20 security
 
WLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WIWLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WI
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
 
Relational Database Design Bootcamp
Relational Database Design BootcampRelational Database Design Bootcamp
Relational Database Design Bootcamp
 
DNSSEC Validation Tutorial
DNSSEC Validation TutorialDNSSEC Validation Tutorial
DNSSEC Validation Tutorial
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymity
 
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution PlansSqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
 
Intro to Cypher
Intro to CypherIntro to Cypher
Intro to Cypher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Searching in Privacy