logo
Dates

Author


Conferences

Tags

Sort by:  

Conference:  Black Hat Asia 2023
Authors: Linus Kvarnhammar
2023-05-11

In 2021, Swedish national television (SVT) aired a six-part TV series called "Hacked" where 4 professional hackers set out to hack into the private assets of normal people, celebrities, and companies. They had all agreed to participate in a cyber security experiment but were unaware of what exactly was going to happen. Linus was one of the 4 hackers in the TV series and in this talk, he is going to talk about some of the highlights that were seen on-screen as well as behind the scenes.
Authors: Catherine Paganini
2022-10-25

tldr - powered by Generative AI

The Cloud Native Glossary is a Community Driven and Trusted source for Cloud Native definitions that aims to explain complex technical terms in simple words. It provides definitions that are objective, up-to-date, and vendor-neutral. The Glossary is accessible to both technical and non-technical audiences, with daily examples and localized versions in multiple languages. The Glossary is maintained by a team of contributors and is open to contributions from the community.
  • The current status quo of Cloud Native definitions is biased, outdated, and not accessible to non-technical audiences.
  • The Cloud Native Glossary provides a trusted, objective, and up-to-date source of definitions that is accessible to both technical and non-technical audiences.
  • The Glossary uses easy language, daily examples, and localized versions in multiple languages to make it accessible to a wider audience.
  • The Glossary is maintained by a team of contributors and is open to contributions from the community.
Conference:  Transform X 2021
Authors: Daniel Levine, Caryn Marooney, Anu Hariharan
2021-10-07

Venture capital (VC) investors have dramatically increased the pace of dealmaking in the field of AI and ML. In 2020, over 1600 rounds worth over $27b were closed by US-based startups in this space, and 2021 is on track to set an even higher record. Navigating this landscape can be difficult for founders. In addition to the operational aspects—recruiting a team, building technology, working with prospects and customers, finding product-market fit—founders also face fundraising-related decisions with implications for the years to come. What are investors looking for? Which ones have experience with AI startups? What should be expected post-investment? In this panel, top VC investors in the AI and ML space will share how they evaluate startups, give advice to founders raising capital, and explain best ways to leverage your existing (and future) investors.
Authors: Ric Campo
2021-09-24

tldr - powered by Generative AI

The presentation covers the top three major breaches reported via IHaveBeenPwned in the APAC region in 2021, offering a summary of the publicly known information, how the attacks occurred, and providing tips on how to prevent these types of attacks.
  • IHaveBeenPwned is a platform created and maintained by Troy Hunt that allows users to check if their email address or password has been compromised
  • The presentation covers three major breaches in the APAC region: Raychat, Oxfam Australia, and Domino's India
  • For Raychat, basic security guidelines and vendor recommendations should be followed, and free resources like OWASP should be utilized
  • For Oxfam Australia, a good security program with good detection systems is essential, and people should be trained and controls should be implemented
  • For Domino's India, security involves all parts of the business, including third-party programs, and it's important to help those businesses protect themselves
  • An anecdote about the Raychat breach is provided, highlighting the importance of honesty and helping customers secure their data
  • References are provided for those interested in learning more