logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Lukonde Mwila
2023-04-19

tldr - powered by Generative AI

The presentation discusses the importance of secure secret strategies in Kubernetes and highlights the vulnerabilities around the storage, sharing, and consumption of secrets in Kubernetes.
  • The best-kept secrets are the ones we've never heard of or told others about
  • A secure secret strategy in Kubernetes depends on addressing questions such as where the secret is kept, who needs to know about it, how it gets shared, and how to prevent it from being easily interpreted
  • The vulnerabilities around the storage, sharing, and consumption of secrets in Kubernetes are well known and more likely to be exploited
  • The presentation shares a real-world project's Kubernetes secret strategy in relation to these questions and how to develop a framework for a secure secret lifecycle in Kubernetes environments
  • The presentation includes a demo using ESO, ArgoCD, and OPA Gatekeeper
Authors: Emily Fox
2022-05-19

tldr - powered by Generative AI

The Cloud Native Chasm: Building a Secure High-Impact Project
  • Cloud native projects require a guide to navigate the complex and massive landscape
  • Security is often not added on day one and needs to be considered after understanding the project's goals and environment
  • Building a secure high-impact project requires help and a security mindset from all contributors
  • Projects need to plan for changing uses and new use cases that may reveal inherent weaknesses or invalid security assumptions
  • Public discussion, clearly documented decisions, and well-defined roadmaps with clear outcomes are necessary for building and securing projects
  • Participating in security reviews and assessments and joining security-focused groups can help reframe thinking and create more secure structures
Authors: Josh Berkus, Catherine Paganini
2021-10-14

tldr - powered by Generative AI

Tips for keeping contributors motivated and encouraged to contribute to a project
  • Clearly communicate goals and expectations to contributors
  • Minimize steps and use tools to reduce difficulty of contributing
  • Create a welcoming community and make one-on-one connections with contributors
  • Develop recognition programs and offer mentoring and swag to contributors
  • Formal governance and contributor rules can lower risk and difficulty of contributing
Conference:  Transform X 2021
Authors: Catherine Williams
2021-10-07

Catherine Williams, Global Head of iQ at Qualtrics , discusses the key things that enterprises should think about, as they develop and grow an AI strategy for maximum business impact. She shares a framework for choosing which kinds of problems organizations should apply AI to, and the steps needed to operationalize AI successfully. Join this session to learn how you can best build an AI strategy for your own organization.
Conference:  Transform X 2021
Authors: Chris Hazard
2021-10-07

tldr - powered by Generative AI

The presentation discusses the importance of privacy in data synthesis and the use of synthetic data to enhance privacy while unlocking the value of data. It also highlights the challenges and potential risks associated with synthetic data and the need for proper application of privacy techniques.
  • Privacy affects behavior and is crucial for building trust and value in a brand
  • Synthetic data can be used to unlock the value of data while maintaining privacy
  • Proper application of privacy techniques is necessary to avoid potential risks and challenges associated with synthetic data
  • Synthetic data can be generated using various techniques such as Bayesian networks and GANs
  • Synthetic data sets should be generated with distributions that have the same analytic outcome as the original data
  • Synthetic data sets should be generated with caution to avoid leaking privacy
  • Synthetic data sets can be generated multiple times with different levels of fidelity as long as privacy is maintained
  • Validation of privacy and value is necessary when using synthetic data