Code Signing and How it Helps Prevent Malware AttacksRead more >
Discussion on the new code and implications during 2015 - come along and ask a question !Read more >
Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.
Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.
Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.
Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.
Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.
Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.
Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.
Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !
Do you know what code is going into your production systems? How can you support something you haven't seen? Whether you currently do code reviews or think it might be a good practice to start doing, this session will help you make the most of the code review process. For DBAs, we'll cover key things to look for such as looking for potential problems. For developers, this will be insight for you into how DBAs think when reviewing your code so you have a better idea what to expect.
•Learn what kind of things to look for when reviewing code
•Gain insight into what to expect from a DBA when they review your code
•Discover how to have an effective communication between DBA and developer
Day 2 of our three-day class “Secure Code — Now and in the Future” will start with an overview of relevant certifications, look at chain of control and deployment issues (including secure boot and update), and proceed through tools that are available and in place to help develop secure code.Read more >
"Managing the process of writing secure code in a timely manner" is the first class in our series “Secure Code — Now and in the Future."
Writing secure code is a constant challenge. You must have the right policies, processes, and tools in place. Day 1 of this three-day class will start from the beginning, ensuring that your first step is in the right direction, then outline how security touches each point in the product life cycle, some of the pitfalls you will likely encounter and how to steer clear, and survey existing standards and guidelines with examples of good, bad, and ugly code.
Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
What good is great secure code if it if it isn’t part of a great application? Day 3 of our three-day class “Secure Code — Now and in the Future" will take the valuable insights learned on Days 1 and 2 and apply them to a real-world automotive application. If that's the area you're designing for, great. But if not, don't despair, as the expert instructor will point out how the variables that apply directly to an automotive application correlate to other applications.Read more >
Advanced persistent threats (APTs) like Stuxnet and Duqu have caused many software-producing organizations to re-examine their code signing operations – specifically the security of private signing keys that underpin the integrity of the entire process. What many don’t realize is that they can both increase the assurance level of their code signing AND simplify and automate their code signing workflows at the same time!
Join Thales security expert Peter DiToro on April 24, 2012 at 2:00pm EST for an informative session where you will learn how to:
• Provide high assurance protection for private code signing keys and digital signature operations
• Automate and simplify code signing workflows in multi-workstation environments
• Apply cryptographic best practices to significantly reduce the risk of malicious software alteration and protect your brand.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.Read more >
Many of today’s marketers, retailers, suppliers and more are using QR codes and Microsoft Tags to attract, retain and inform consumers. These 2D barcodes are plastered in magazines, bus stops, billboards, direct mail and even restaurant menus. They have consumed the marketplace and research shows that they will only gain in popularity. In this webinar, we will discuss the differences/benefits between QR codes and Microsoft Tags, and provide examples of how/where they are used in marketing.Read more >
come and ask questions of the code...Read more >
Mobile applications handle our most sensitive data – phone calls, SMS, geographic locations, financial information… the question is – can we really tell they’re secure? Who can assure us that they are not being spied upon? Can they be abused?
Erez Metula, world renowned application security expert, industry speaker and author of "Managed Code Rootkits will answer these questions, focusing on Android mobile applications and their common vulnerabilities.
This session will be all about the security of Android applications, how they can be hacked, the common mistakes developers make, and how they can be avoided.
The idea of automation in IT is not new. IT has always looked to script and batch file parts of it's operations. Infrastructure as code goes beyond just automation and looks to leverage practices and tools from software development. It is also a mindset change in the way we deploy and manage our infrastructure.
In this webinar with Sriram Rajan, Principle DevOps Engineer, we will cover:
- Why infrastructure as code
- Tools of the trade
- Best practices
- Rackspace automation support services
This is the second in a series of five DevOps webinars from Rackspace Academy. You can register for the others and watch replays of the ones you missed on our BrightTalk channel.
Please join to discuss and ask questions of Heather on the code.Read more >
What’s in your code? Gone are the days when an application simply ran on a single server instance, OS, disk and network. Today, business application code can be greatly distributed - even changing execution stack from instance to instance. Developing code for the new virtualized and cloud-aware world can be a daunting task indeed.
How can you ensure your application code is written to be as efficient, lightweight and reliable as possible? Watch this video to hear from Riverbed performance experts who will deliver a set of insights that will help your organization deliver better performing code.
Topics will include:
- How deep-dive performance monitoring can change the way you code
- The importance of understanding how to break down multi-step transactions
- Why user expectation is the only metric that matters to management - and how to beat it
- How to most effectively get to the root cause of performance issues
and many more. Don’t wait, watch this video now to ensure your code will continue to deliver performance that keeps users happy and keeps you employed.
In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.
Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.
Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.
In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
Scott Stratten is the President of Un-Marketing. He is an expert in Viral, Social, and Authentic Marketing which he calls Un-Marketing.
With two best-selling books, and a third on the way entitled “QR Codes Kill Kittens”. Scott now has over 150,000 people follow his daily rantings on Twitter and was named one of the top 5 social media influencers in the world on Forbes.com.
Listen to Scott discuss his latest book 'QR Codes Kills Kittens', including a question and answer session.