Startpage, the world’s most private search engine, is helping educate students on data privacy and protection with our Private Search 101 university lesson plan.
Are you a student or professor interested in learning more about how to protect your privacy online? Learn more with our accessible, informative Private Search 101 university lesson plan.
Search Engine Skills for Workplace InvestigatorsCase IQ
Whether you are investigating fraud, harassment or other misconduct, solid online research skills can serve you well. The internet is a valuable resource for finding information and evidence to support your case, and it’s important to stay up to date on its use and limitations.
Join Cynthia Hetherington, investigation expert, trainer and founder of Hetherington Group, as she explores techniques and tools for getting the information you need online.
Investigating online conducting pre-interview researchCase IQ
Going into an investigation interview with no knowledge of the interview subject is like going into a job interview with no knowledge about the company. You’re unlikely to get the information you need (or the job you want).
Before meeting an interview subject an investigator should do some online research on the interview subject. Background information can help the investigator establish rapport, identify areas of vulnerability and determine questioning strategies.
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
Webinar: An EU regulation affecting companies worldwide - GDPRpanagenda
Webinar recording: http://pan.news/lpL030kab92
Abstract: Do you work internationally? Do you have or are you planning to have employees and customers in the European Union? Then you are also affected by the European Union's "General Data Protection Regulation" (GDPR) coming into force on May 25th, 2018. It is the most influential change in the area of privacy and data protection in European history.
In this webinar, we want to summarize the most important legislative changes. We will also show you how our solutions help IBM Domino customers to meet their documentation obligations and regulatory requirements.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Search Engine Skills for Workplace InvestigatorsCase IQ
Whether you are investigating fraud, harassment or other misconduct, solid online research skills can serve you well. The internet is a valuable resource for finding information and evidence to support your case, and it’s important to stay up to date on its use and limitations.
Join Cynthia Hetherington, investigation expert, trainer and founder of Hetherington Group, as she explores techniques and tools for getting the information you need online.
Investigating online conducting pre-interview researchCase IQ
Going into an investigation interview with no knowledge of the interview subject is like going into a job interview with no knowledge about the company. You’re unlikely to get the information you need (or the job you want).
Before meeting an interview subject an investigator should do some online research on the interview subject. Background information can help the investigator establish rapport, identify areas of vulnerability and determine questioning strategies.
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
Webinar: An EU regulation affecting companies worldwide - GDPRpanagenda
Webinar recording: http://pan.news/lpL030kab92
Abstract: Do you work internationally? Do you have or are you planning to have employees and customers in the European Union? Then you are also affected by the European Union's "General Data Protection Regulation" (GDPR) coming into force on May 25th, 2018. It is the most influential change in the area of privacy and data protection in European history.
In this webinar, we want to summarize the most important legislative changes. We will also show you how our solutions help IBM Domino customers to meet their documentation obligations and regulatory requirements.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Dealing with poor data quality of osint data in fraud risk analysisUniversity of Twente
Presented at the SIKS Smart Auditing Workshop, 25 Feb 2015.
Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often represents a 'paper reality'. Fraudsters will attempt to disguise themselves in the data they supply painting a world in which they do nothing wrong. This blind spot can be counteracted by enriching the data with traces and indicators from more 'real-world' sources such as social media and internet. One of the crucial data management problems in accomplishing this enrichment is how to capture and handle data quality problems. The presentation will start with a real-world example, which is also used as starting point for a problem generalization in terms of information combination and enrichment (ICE). We then present the ICE technology as well as how data quality problems can be managed with probabilistic databases. In terms of the 4 V's of big data -- volume, velocity, variety and veracity -- this presentation focuses on the third and fourth V's: variety and veracity.
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
How People Care about their Personal Datatheir Data Released onReleased on So...Kellyton Brito
Content sharing services have become immensely popular on the Web. More than 1 billion people use this kind of services to communicate with friends and exchange all sorts of information. In this new context, privacy guarantees are essential: guarantees about the potential release of data to unintended recipients and the use of user data by the service provider. Although the general public is concerned about privacy questions related to unintended audiences, data usage by service providers is still misunderstood. In order to further explore this level of misunderstanding, this work presents the results of a survey conducted among 900 people with the aim of discovering how people care about the use of their personal data by service providers in terms of social media. From the results, we found that: (i) in general people do not read license terms and do not know very much about service policies, and when presented with these policies people do not agree with them; (ii) a good number of people would support alternative models such as paying for privacy or selling their personal data; and (iii) there are some differences between generations in relation to how they care about their data.
This webinar from Deeson with digital law specialist Heather Burns offers actionable guidance for business leaders to kick-start the GDPR compliance process.
Google's Effort to Fight Content Piracy. Google is ready to fulfil its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
These are the slides used in the presentation I gave alongside Haydn Thomas and Andrew Cross from Lightful.
The presentation was to help charities understand the most pressing implications of GDPR as well from an operational and marketing standpoint.
You can find out more about our organisations here:
https://tech-trust.org/
https://www.lightful.com/
https://www.meetup.com/netsquaredlondon/
Due to increasing security concerns across different industries, such as law enforcement, defense, banking, health care, information technology, and education, the market for computer or digital forensics is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in a rapid, cost-effective manner.
Whether you are a large organization with an internal Investigations department or an independent Forensics Investigator, you will experience a significant increase in productivity which equates to decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting relevant activity that may be of value and have more time to focus on the actual investigation.
AI for humans - the future of your digital selfSpeck&Tech
ABSTRACT: In this talk, George will demonstrate the extent and power of personal data collected by technology companies. He will explore the potential of personal data to do both good and bad, the dangers of giving up your "digital DNA", and the value these companies extract from this data.
Data rights are finally legally recognised. With the combination of GDPR & rising awareness of personal data abuse, we might eventually be able to control our data, or at least understand as much about our digital footprint as profit-driven companies do.
AI is only possible because it has data. Imagine your data being used to benefit you, instead of targeting you with gambling adverts. Imagine the potential for next-generation research to understand our society, which can only happen if we break data out from being locked in corporate databases. Data rights are just the start, now we need to use them.
BIO: George Punter holds a first class Masters degree from Imperial College London in Electronics & Information Engineering. He co-founded Ethi (ethi.me), a startup that aims to make controlling your personal data easier, and allow users to use their personal data for their own benefit, or for social good. Ethi is currently partnering with a cyber security firm, TurgenSec, to help create next-generation, user-centred security.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
data mining privacy concerns ppt presentationiWriteEssays
Data Mining and privacy Presentation
This is a sample presentation on data mining. The presetation looks at the critical Issues In Data Mining: Privacy, National Security And Personal Liberty Implications Of Data Mining
Garrett eDiscovery, Forensic and Legal consultants conduct thorough and effective computer investigations of any kind, including intellectual property theft, incident response, compliance auditing and responding to e-discovery requests—all while maintaining the forensic integrity of the data. Read more at http://www.garrettdiscovery.com/
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
Ready to avoid crowded stores and online scammers during the holidays? Join Michele Chubirka as she goes through:
-Tips for safe online shopping and securing your banking information
-Protecting yourself from internet scams, phishing and fraud
Safeguard your personal information against identity theft
-How to use Anti-virus and other security software to keep your digital information safe.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Dealing with poor data quality of osint data in fraud risk analysisUniversity of Twente
Presented at the SIKS Smart Auditing Workshop, 25 Feb 2015.
Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often represents a 'paper reality'. Fraudsters will attempt to disguise themselves in the data they supply painting a world in which they do nothing wrong. This blind spot can be counteracted by enriching the data with traces and indicators from more 'real-world' sources such as social media and internet. One of the crucial data management problems in accomplishing this enrichment is how to capture and handle data quality problems. The presentation will start with a real-world example, which is also used as starting point for a problem generalization in terms of information combination and enrichment (ICE). We then present the ICE technology as well as how data quality problems can be managed with probabilistic databases. In terms of the 4 V's of big data -- volume, velocity, variety and veracity -- this presentation focuses on the third and fourth V's: variety and veracity.
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
How People Care about their Personal Datatheir Data Released onReleased on So...Kellyton Brito
Content sharing services have become immensely popular on the Web. More than 1 billion people use this kind of services to communicate with friends and exchange all sorts of information. In this new context, privacy guarantees are essential: guarantees about the potential release of data to unintended recipients and the use of user data by the service provider. Although the general public is concerned about privacy questions related to unintended audiences, data usage by service providers is still misunderstood. In order to further explore this level of misunderstanding, this work presents the results of a survey conducted among 900 people with the aim of discovering how people care about the use of their personal data by service providers in terms of social media. From the results, we found that: (i) in general people do not read license terms and do not know very much about service policies, and when presented with these policies people do not agree with them; (ii) a good number of people would support alternative models such as paying for privacy or selling their personal data; and (iii) there are some differences between generations in relation to how they care about their data.
This webinar from Deeson with digital law specialist Heather Burns offers actionable guidance for business leaders to kick-start the GDPR compliance process.
Google's Effort to Fight Content Piracy. Google is ready to fulfil its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
These are the slides used in the presentation I gave alongside Haydn Thomas and Andrew Cross from Lightful.
The presentation was to help charities understand the most pressing implications of GDPR as well from an operational and marketing standpoint.
You can find out more about our organisations here:
https://tech-trust.org/
https://www.lightful.com/
https://www.meetup.com/netsquaredlondon/
Due to increasing security concerns across different industries, such as law enforcement, defense, banking, health care, information technology, and education, the market for computer or digital forensics is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in a rapid, cost-effective manner.
Whether you are a large organization with an internal Investigations department or an independent Forensics Investigator, you will experience a significant increase in productivity which equates to decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting relevant activity that may be of value and have more time to focus on the actual investigation.
AI for humans - the future of your digital selfSpeck&Tech
ABSTRACT: In this talk, George will demonstrate the extent and power of personal data collected by technology companies. He will explore the potential of personal data to do both good and bad, the dangers of giving up your "digital DNA", and the value these companies extract from this data.
Data rights are finally legally recognised. With the combination of GDPR & rising awareness of personal data abuse, we might eventually be able to control our data, or at least understand as much about our digital footprint as profit-driven companies do.
AI is only possible because it has data. Imagine your data being used to benefit you, instead of targeting you with gambling adverts. Imagine the potential for next-generation research to understand our society, which can only happen if we break data out from being locked in corporate databases. Data rights are just the start, now we need to use them.
BIO: George Punter holds a first class Masters degree from Imperial College London in Electronics & Information Engineering. He co-founded Ethi (ethi.me), a startup that aims to make controlling your personal data easier, and allow users to use their personal data for their own benefit, or for social good. Ethi is currently partnering with a cyber security firm, TurgenSec, to help create next-generation, user-centred security.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
data mining privacy concerns ppt presentationiWriteEssays
Data Mining and privacy Presentation
This is a sample presentation on data mining. The presetation looks at the critical Issues In Data Mining: Privacy, National Security And Personal Liberty Implications Of Data Mining
Garrett eDiscovery, Forensic and Legal consultants conduct thorough and effective computer investigations of any kind, including intellectual property theft, incident response, compliance auditing and responding to e-discovery requests—all while maintaining the forensic integrity of the data. Read more at http://www.garrettdiscovery.com/
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
Ready to avoid crowded stores and online scammers during the holidays? Join Michele Chubirka as she goes through:
-Tips for safe online shopping and securing your banking information
-Protecting yourself from internet scams, phishing and fraud
Safeguard your personal information against identity theft
-How to use Anti-virus and other security software to keep your digital information safe.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
With all the things that go "bump" in the night, nothing worries administrators and even end users more than a security incident. This webinar will focus on building an understanding of IT Security and the tools that can help mitigate risk. Moreover, attendees will leave with a clear understanding of general informational security terms and processes that they can implement in their library same day to help safeguard and better protect their infrastructure and data. Brian Pichman of the Evolve Project will lead us through putting together components for a Security and Risk Plan and how to properly respond to threats and attacks.
Evaluating the use of search engines and social Media todaySimeon Bala
Search engines are an essential tool for any marketer or researcher who needs to quickly find relevant information. It is no surprise that they can be used to obtain a variety of different types of data.
In the past, search engines were just a means of accessing information that had been collected and cataloged by humans. But today they are also a tool for collecting data themselves.
This presentation was given to evaluate the impact of social engines and mobile devices today.
The presentation contain idea and tips on how to live online. Google and Facebook were used as case study as they are the biggest.
Presentation was done by Simeon Bala
9jaoncloud.com.ng
publicopinion.org.ng
As the number of information requests increase exponentially, organizations worldwide can no longer process all information requests in time. Large government organizations have huge departments handling these requests and in some cases these are up to 10 times larger than internal legal departments. This shows the urgency to involve more automation handling the public records requests.
When handling public records requests, many possible levels of automation exist to optimize the process, use resources more effectively, and to deal with increasing data volumes.
Securing and Safeguarding Your Library SetupBrian Pichman
We will explore various tools, techniques, & procedures to ensure our environment's safety & security. Leave with a list of ideas you can use today within your library.
Marketers know they need complete data to deliver a great customer experience, but few actually have built the data they need. Maybe they don't know how, but more likely they just are spending their time on other things that seem more important. This presentation shows the great things they could do if they had better data in place, in the hopes of convincing them to give data a higher priority. It has kittens too.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
The convergence of information and cybersecurity is highly relevant in the context of your reputational and financial concerns, a combination of physical and cyber security applied to your requirements will strengthen your overall security posture and resilience to risk. In this article I am explaining how to protect your digital security and privacy as an individual, but the strategies are equally suited for small businesses as well.
Facebook recently came under fire for the discreet international roll-out of its photo facial recognition feature. This feature automatically identifies and suggests tags for individuals appearing in photos posted on Facebook. At first glance, this seemingly innocuous feature appears to quietly augment online social lives. At second glance, the rollout of this feature as a defaulted-to-on setting with no explicit user consent raises many privacy concerns. As a site with extensive power driven by the quantity, quality, and kind of data it collects, Facebook’s decision to step into the world of visual recognition of its users without formal user consent is a big no-no—or is it?
Join us for this month’s eBoost Consulting Brown Bag Lunch Webinar to explore this and other cases that raise internet privacy concerns. Learn the ins, outs, and nuances of internet privacy to determine where to draw the line on data collection and usage.
Similar to Why private search is important for everone and how you can protect your personal data. (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. Why should we care?
Historical injustices regarding data collection
• The Holocaust (and the Holocaust in the Netherlands)
• Rwandan genocide
• Japanese-American internment
Today’s world
• Internet regulations
• American immigrants
• NSA blackmail
• High school laptops
• Doe vs Netflix
• Hong Kong protests
• AOL search logs release
3. Historical injustices regarding data collection
•Nazis and Holocaust impact in the Netherlands
• 140,000 Jews lived in Netherlands before Holocaust, 105,000
Jews killed during
• 3 years before the Holocaust, there was a census //
“comprehensive population registration system for administrative
and statistical purposes”
• 73% of Jewish population killed in NL, vs 25% in France, 40% in
Belgium
•Rwandan Genocide
• People had to carry ID cards with their “ethnic group” on it
• Hundreds of thousands systematically killed as a result
•Japanese-American Internment
• U.S. Census Bureau provided the U.S. Secret Service with names
and addresses of Japanese-Americans during World War II
• 120,000 total people interned
4. Data collection today
• 2017 - Trump signed a bill blocking the implementation of rules requiring internet providers to ask
permission before selling sensitive customer data (like web-browsing histories) to advertisers.
• 2009 - School district near Philadelphia lent high schoolers laptops for schoolwork. Installed spyware,
surreptitiously photographed (even at home). Principal confronted a student with pictures of him allegedly
popping pills - turns out they were Mike n Ike’s candy.
• 2006 - Netflix released a dataset of movie ratings with a unique ID associated. People were able to to
compare these reviews against IMDB public reviews - turns out they were able to identify political leanings
and sexual orientation, outing a closeted gay woman.
• 2006 - AOL search log release to the entire world, for research purposes. Through clues revealed in the
search queries, The New York Times successfully uncovered the identities of several searchers.
Do you think these instances are
cause for concern? Why or why not?
5. The engines behind search
Who are the biggest search engines by
volume of search?
• Google
• Bing
• Yandex
• Baidu
Do you have a preferred
search engine? Why?
7. What personal data does your
search engine collect?
Name
Email
Email
Contacts
Phone
Number
Phone
Carrier
Purchase
History
Billing
Information
IP
address
GPS
location
Device
Type
Browser
Type
Your
Apps
Your
Photos
Your
Content
Activity
on other
websites
9. Target you with ads
and content
Retargeting ads that follow you
around the Internet. These
“behavioral ads” are ads based on
your personal data (search history,
location, cookies, etc.). This means
that just because you searched for
the term “help constipation” once,
you will be targeted with ads and
content accordingly in the future.
10. Place price trackers
on you
Companies use dynamic pricing to gather data
and change prices accordingly. You could be
presented with higher prices or fewer discounts
based on your location, device type and
browsing/ purchase history.
• For example - If you have an interest in luxury
goods, own a home, and work in the tech
industry, then your non-private search engine
will help companies target you with ads for
higher-income individuals based on this
personal data alone.
12. Deliver you profiled
search results
Profiled search results keeping you in a filter-
bubble - i.e. personalized news based on
media sites you frequent and themes you
search for.
• Politicians are just ONE of the groups that can
access your valuable personal data, using it to
target you with political ads during their campaigns.
These voting influencers can “personalize” the
content you see in your search results and your
digital feed as a result. Before you know it, your
entire online experience is pre-determined by Big
Tech’s profile on you, leading you down a path
decided by your non-private search engine. Eight
months later, you’re voting for a candidate who has
dominated your digital feed, as a result of
consistently planted content to sway you in a
particular direction.
13. Save and sell your
digital profile
Big Tech presents you with search
results and news based on your
browsing history, location, level of
education, sexual orientation,
political preferences, propensity to
spend, etc. (this information
becomes your digital profile)
14. A state of surveillance
A stored digital record of your
searches that can be obtained law
enforcement and government.
A few ways the government keeps
tabs on you:
• Facial recognition systems
• Search and browsing history
• Stingrays - law enforcement can track
your phone and intercept
communications with stingrays, they can
be hidden in vehicles and attached to
planes
16. Your digital profile exists even when you clear your
search history or “go incognito”
Health
Symptoms
Financial
needs
Travel
Destinations
Level of
Education Sexual
Orientation
Political
Preference
Propensity
to Spend
Mental
State
News
Awareness
17. Researching about your health, finances and
politics can lead to targeting and online profiling
Ad targeting per your health statushttps://www.marketingcharts.com/industries/retail-and-e-commerce-9315
Credit scoring based on your
digital fingerprint
https://danielmiessler.com/blog/new-study-shows-you-can-predict-credit-rating-from-your-online-tech-fingerprint/
Higher prices based on browser history
https://millionmilesecrets.com/guides/are-airlines-raising-your-ticket-price-based-on-browser-history/
https://techscience.org/a/2015090101/
SEME influences govt electionsThe search engine manipulation effect (SEME) and its possible impact on the outcomes of elections
Robert Epstein1 and Ronald E. Robertson
20. How Startpage Private Search Works
Enter your
search query
We remove
all PII from
your search
term
We send your
search term only
to Google who
processes your
search
We deliver you
unprofiled search
results
You are protected
by European and
Dutch privacy
legislation.
1 2 3 4 5
21. Search In True Privacy
The search encryption protocols prevent almost everyone, including
your internet service provider, the NSA, or even a random hacker
from taking a peek at your search.
The search encryption protocols:
• Secure Socket Layer (SSL)
• Transport Layer Security (TLS)
• Perfect Forward Secrecy (PFS)
How Startpage Private Search Works
1
22. Search In True Privacy - detailed
The search encryption protocols:
• Secure Socket Layer (SSL) - the standard security technology for establishing
an encrypted link between a web server and a browser. This link ensures that
all data passed between the web server and browser remain private.
• Transport Layer Security (TLS) - provides privacy and data integrity between
two or more communicating computer applications.
• Perfect Forward Secrecy (PFS) - gives assurances that session keys will not be
compromised even if the private key of the server is compromised. Forward
secrecy protects past sessions against future compromises of secret keys or
passwords. By generating a unique session key for every session a user
initiates, the compromise of a single session key will not affect any data other
than that exchanged in the specific session protected by that particular key.
How Startpage Private Search Works
1
23. Anonymizing Your Search
Your search query is not only secure, but also anonymized.
The search query runs through our “premise servers” located in
Europe that are owned and managed by Startpage where:
1. Servers are located in locked cabinets
2. Data personnel can’t log in
3. Only non-US Startpage administrators manage the servers to
prevent any potential gag orders.
Imagine everything the internet knows about - your search history,
social media data, IRL location… Now imagine all of that bing
stripped away.
How Startpage Private Search Works
2
24. Anonymizing Your Search - detailed
• On-premises is the software and technology that is located within the
physical confines of an enterprise – often in the company's data center
– as opposed to running remotely on hosted servers or in the cloud.
• By installing and running software on hardware located within the
premises of the company, internet technology (IT) staff has physical
access to the data and can directly control the configuration,
management and security of the computing infrastructure and data.
How Startpage Private Search Works
2
25. Accessing Google Tech In Private
Consider Startpage your middleman.
1. Your search query gets sent to a cloud server that doesn’t
know you and communicates with Google. Google sends
back results to the cloud server.
2. Search results are then returned to “premise servers” that
are locked in cabinets, rather than going directly to your
browser. This middle step better protects you by hiding you
behind this privacy wall.
How Startpage Private Search Works
3
26. Un-profiled Search Results
The “premise servers” receive the results and send them back to you.
Since we have zero information about you, the search results cannot
be personalized ensuring you receive the same news and results as
anyone in the world. We call these “unprofiled search results.”
How Startpage Private Search Works
4
27. Browse with Anonymous View
Go beyond search and browse entire websites anonymously.
At the right of each organic search result, you’ll find a link to view
the website with “Anonymous View.”
This is achieved via a proxy that masks your identity from
websites, protecting you from ad tracking, digital profiling and/or
dangerous DNS attacks. The website only sees Startpage, while
you remain safely out of sight.
How Startpage Private Search Works
5
28. Meet Our Team
Kelly Finnerty
Director of Brand and Content
kelly@Startpage.com
@Kelly_Startpage
Alexandra Kubiak
Senior Product Manager
alexandra@Startpage.com
29. Stay informed and protect your privacy
https://www.eff.org/
Privacy Please!
https://www.getrevue.co/profile/Startpage
https://www.startpage.com/blog/
@Startpage
https://www.schneier.com/