logo
Dates

Author


Conferences

Tags

Sort by:  

Conference:  Black Hat Asia 2023
Authors: Maxine Holt, Marina Krotofil, Tara Seals, Fyodor Yarochkin, Stefano Zanero
2023-05-11

Artificial Intelligence (AI) has the potential to revolutionize cybersecurity by enhancing detection and response capabilities, automating routine tasks, and identifying threats that are invisible to humans. However, AI also poses significant risks, including the potential for attackers to use AI to develop more sophisticated attacks and evade detection. Panelist will explore how AI can be used to improve cybersecurity, the ethical considerations of using AI in security, and how to manage the risks associated with AI-powered security systems. Additionally, the panel will discuss the future of AI and cybersecurity and the role the InfoSec community and policymakers can have in shaping the development and use of AI in security.
Authors: Florent Poinsard, Arthur Schreiber
2023-04-21

tldr - powered by Generative AI

GitHub uses MySQL and v-test for their database management and scaling strategy
  • GitHub has a standard MySQL setup with 80 clusters and 2000 instances
  • They have a read-heavy load with 330 terabytes of data across primaries and replicas
  • Their scaling strategy includes setting up separate clusters for new features, breaking up existing clusters, and adding more replicas
  • They ran into problems with scaling approaches and schema migration times
  • They implemented v-test as a solution, which is a sharding model that fits their data model well
  • v-test allows for seamless schema changes, automatic failure detection and repair, and query consolidation
  • GitHub has successfully migrated 20 key spaces to v-test, reducing the number of hosts needed and improving read and write rates
Authors: Matt Turner, Francesco Beltramini
2023-04-20

tldr - powered by Generative AI

The presentation discusses the importance of intelligence-driven defense in cybersecurity and how it can be implemented in cloud-native infrastructure using automation and orchestration tools.
  • Intelligence-driven defense involves knowing the enemy and their tactics to break the kill chain
  • Attack is an open-source framework that provides a taxonomy of tactics and techniques used by attackers
  • SOAR (Security Orchestration Automation Response) is a platform that enables organizations to collect data about security threats and respond to security events with little or no human assistance
  • Cloud-native platforms offer advanced capabilities and automation tools that can be leveraged for incident response
  • GitOps can provide an audit trail and a deterministic, reproducible way of working
  • An operator can be used to automate response actions based on security events
Authors: Mo Khan, Micah Hausler
2023-04-20

tldr - powered by Generative AI

The presentation discusses the process of reporting and handling security issues in Kubernetes, including the role of the Security Committee and the Bug Bounty program.
  • The Security Committee assesses reported issues and works with code owners to determine if they are legitimate security issues.
  • CVEs are issued for security issues and the release team is involved if the issue affects core Kubernetes.
  • Distributors are notified for medium or high severity issues that may affect their users.
  • The Bug Bounty program offers rewards for responsibly reported security issues.
  • Reporting security issues through HackerOne or the email list is encouraged.