logo
Dates

Author


Conferences

Tags

Sort by:  

Conference:  Defcon 31
Authors: Nicolas Minvielle Making Tomorrow, Xavier Facélina Seclab
2023-08-01

The links between science fiction and reality have been demonstrated in numerous research studies. By speculating about the possible future uses of technologies under development, science fiction shows us plausible futures. In this sense, it allows us, as a society, to popularize and debate the consequences (expected or not) of our technological developments. In addition to this not negligible social role science fiction also has an impact on our current developments. We speak here of "loop-looping", i.e. there is a feedback loop between what science fiction shows us and what we are then led to actually develop. From this point of view, our imaginations are performative, and this is perhaps the most critical issue: what I see can happen. In the case of hacking and cybersecurity, a particular phenomenon is added: the general public's knowledge of these subjects is mainly through the fictions they watch, read, or listen to. We propose to analyze a corpus of 200 fictional attacks, and 800 real attacks and to compare them to define if the imaginary ones are predictive if they inform us or on the contrary mislead us as for the reality of the current attacks.
Authors: Ricardo Katz, James Strong
2022-10-28

tldr - powered by Generative AI

The presentation discusses the complexity of managing the Ingress Nginx project and the roadmap for future developments.
  • The Ingress Nginx project is complex and requires extensive testing and maintenance
  • The project includes multiple container images, static configurations, annotations, and configuration options
  • The roadmap includes a data plan control plane split and the addition of new features such as Open Telemetry
  • Users are encouraged to test new releases and provide feedback to ensure stability
  • The CH root environment was added to address a CVE vulnerability and will be removed once the CPDP split is complete
Authors: Medya Ghazizadeh
2021-10-15

tldr - powered by Generative AI

The importance of understanding and learning from the people involved in maintaining a big project, as well as the need to balance budgets for security, creativity, and order. The speaker also discusses the lessons they learned as a maintainer of MiniKube, including the need to say no to spam contributions, promotion-driven development, and potential security liabilities.
  • Learning from the people involved in maintaining a big project is crucial for success
  • Balancing budgets for security, creativity, and order is essential
  • Lessons learned as a MiniKube maintainer include saying no to spam contributions, promotion-driven development, and potential security liabilities
Authors: Jaya Baloo
2021-09-24

tldr - powered by Generative AI

The speaker discusses the challenges of information security and the need for a clear focus on the top priorities to address the problem.
  • Information security is facing challenges, including the rise of ransomware cases.
  • There is a need for better communication and prioritization of the top security issues.
  • Organizations should focus on the top 10 must-haves for each year to make security goals more achievable.
  • Security should be presented in a financially understandable way to demonstrate its value to the enterprise.
  • Rules of engagement should be established to address cyber threats and espionage.
  • The speaker emphasizes the need for a sustainable approach to fixing security problems.
  • The speaker also highlights the importance of engaging with different groups to set rules of engagement and address cyber threats.
  • The speaker uses the example of the Cassandra complex to illustrate the challenge of getting people to believe in the predictions of security experts.