SlideShare uma empresa Scribd logo
1 de 91
Mobile
Security
An Oxymoron?

         Pedro	
  Cabrita 	
  <pfcabrita@gmail.com>	
  
         Bruno	
  Morisson 	
  	
  <morisson@genhex.org>	
  
About	
  us	
  
                      Pedro	
  Cabrita	
                                                      Bruno	
  Morisson	
  
                      <pfcabrita@gmail.com>	
                                                 <morisson@genhex.org>	
  
                                                                                              h>p://genhex.org/~mori/	
  

                                                                         •  Principal	
  Consultant	
  and	
  Partner	
  @	
  
•  Infosec	
  Consultant	
  &	
  Partner	
  @	
  BiAHEAD;	
                 INTEGRITY	
  S.A.;	
  
•  Working	
  in	
  InformaSon	
  Security	
  for	
  the	
               •  Working	
  in	
  infosec	
  for	
  over	
  12	
  years;	
  
   past	
  11	
  years;	
  
   	
                                                                    •  In	
  a	
  past	
  life,	
  Security	
  OperaSons	
  Manager	
  
•  About	
  10	
  years	
  working	
  @	
  a	
  financial	
                    and	
  Senior	
  Infosec	
  Consultant	
  @	
  a	
  private	
  
   insStuSon;	
                                                               telco;	
  
                                                                         	
  
•  I	
  do	
  mainly	
  PenTesSng	
  for	
  living	
  (and	
  have	
     •  Did	
  Sme	
  as	
  a	
  developer	
  (C/C++);	
  
     fun);	
  
     Also:	
  secure	
  coding	
  guidelines	
  &	
  reviews;	
          •  CISSP-­‐ISSMP,	
  CISA,	
  ISO27k1LA,	
  ITILv3,	
  …	
  
     reverse	
  engineering;	
  risk	
  assessments;	
  
     audits…	
  	
  and	
  other	
  security	
  related	
  stuff!	
       •  MSc	
  InformaSon	
  Security	
  student	
  @	
  Royal	
  
	
                                                                          Holloway,	
  University	
  of	
  London	
  
•  CISSP	
  

•  But	
  life	
  isn’t	
  all	
  about	
  security…	
  
	
  
What	
  is	
  Mobile	
  Security	
  ?	
  
Mobile Securty - An Oxymoron?
InformaSon	
  
Why	
  do	
  we	
  care	
  ?	
  
Approach	
  
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Thinking	
  security…	
  
•  What	
  can	
  someone	
  do	
  with	
  momentarily	
  
   physical	
  access	
  to	
  my	
  device	
  ?	
  
•  How	
  secure	
  is	
  my	
  informaSon	
  if	
  my	
  device	
  is	
  
   lost/stolen	
  ?	
  
•  What	
  else	
  can	
  go	
  wrong	
  ?	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Demo	
  
h>p://lifehacker.com/5811383/these-­‐are-­‐the-­‐most-­‐common-­‐lockscreen-­‐pins-­‐and-­‐you-­‐should-­‐avoid-­‐using-­‐them	
  
Mobile Securty - An Oxymoron?
h>p://www.whispersys.com/screenlock.html	
  
h>p://electronicspyeye.info/your-­‐fingers-­‐are-­‐greasy-­‐giving-­‐up-­‐your-­‐android-­‐password/	
  
h>p://stream.pleated-­‐jeans.com/post/8575021665/password-­‐acquired?e6abb3a8	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Filesystem	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Juice	
  Jacking	
  
h>p://www.pcworld.com/arScle/238499/charging_staSons_may_be_juicejacking_data_from_your_cellphone.html	
  
h>p://krebsonsecurity.com/2011/08/beware-­‐of-­‐juice-­‐jacking/	
  
Bo>om	
  line…	
  
•  If	
  	
  someone	
  has	
  physical	
  access	
  to	
  the	
  
   device...	
  GAME	
  OVER!	
  
•  Turn	
  on	
  security	
  features	
  (encrypSon,	
  
   authenScaSon,	
  remote	
  wipe/lock)	
  
•  Choose	
  an	
  appropriate	
  PIN	
  
•  Wash	
  your	
  hands	
  frequently	
  
•  Don’t	
  connect	
  it	
  anywhere...	
  except	
  home!	
  
Users	
  

ApplicaSons	
  

      OS	
  

  Transport	
  

Transmission	
  

   Physical	
  
Thinking	
  security…	
  
•  Is	
  my	
  informaSon	
  transmi>ed	
  securely?	
  
•  Can	
  someone	
  eavesdrop	
  my	
  communicaSons?	
  
GSM	
  



...is	
  broken!	
  
GSM	
  

Professional	
  equipment	
  



                  US$75.000	
  
GSM	
  
                                     USRP	
  


                                                US$1.500	
  



h>p://openbts.sourceforge.net/	
  
GSM	
  
                                     Old	
  phone	
  


                                         Priceless	
  



h>p://openbts.sourceforge.net/	
  
GSM	
  
                                     Old	
  phone	
  


                                         Priceless	
  
                                         US$10	
  


h>p://openbts.sourceforge.net/	
  
Mobile Securty - An Oxymoron?
Bo>om	
  line…	
  



Don’t	
  trust	
  the	
  link	
  layer	
  	
  J	
  
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Thinking	
  security…	
  
•  Do	
  applicaSons	
  transmit	
  data	
  securely	
  ?	
  
•  What	
  data	
  ?	
  
•  Can	
  someone	
  intercept	
  it	
  ?	
  
h>p://www.theregister.co.uk/2011/05/16/android_impersonaSon_a>acks/	
  
h>p://support.apple.com/kb/HT4824	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Bo>om	
  line…	
  
•  Lots	
  and	
  lots	
  of	
  apps	
  send	
  informaSon	
  in	
  clear	
  
•  Some	
  apps	
  handle	
  SSL	
  errors	
  really	
  badly…	
  
•  Bugs	
  in	
  the	
  underlying	
  OS	
  
	
  
	
  

                          CHAOS	
  
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Thinking	
  security…	
  
•    How	
  do	
  security	
  issues	
  affect	
  the	
  OS	
  ?	
  
•    Is	
  it	
  updated	
  ?	
  
•    For	
  how	
  long	
  ?	
  
•    Does	
  it	
  do	
  anything	
  should	
  know	
  about	
  ?	
  
Mobile Securty - An Oxymoron?
h>p://www.pcworld.com/businesscenter/arScle/239607/diginotar_cerSficates_are_pulled_but_not_on_smartphones.html	
  
h>p://www.zdnet.com/blog/london/-­‐8216hacked-­‐server-­‐claims-­‐another-­‐cerSficate-­‐authority-­‐casualty/596	
  
h>p://threatpost.com/en_us/blogs/new-­‐ios-­‐bug-­‐lets-­‐apps-­‐run-­‐unsigned-­‐code-­‐110711	
  
h>ps://twi>er.com/#!/dinodaizovi/status/133705807157145600	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
h>p://corte.si/posts/security/openfeint-­‐udid-­‐deanonymizaSon/index.html	
  
h>p://corte.si/posts/security/openfeint-­‐udid-­‐deanonymizaSon/index.html	
  
Bo>om	
  line…	
  
•  Difficult	
  (impossible?)	
  to	
  keep	
  updated	
  
•  “secret”	
  features	
  reveal	
  private	
  informaSon	
  
•  Encourages	
  uploading	
  private	
  informaSon	
  to	
  
   the	
  “cloud”	
  
•  Insecure	
  default	
  configuraSons	
  

However,	
  they	
  do	
  provide	
  interesSng	
  security	
  
features	
  
Users	
  

Applica4ons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Thinking	
  security…	
  
•    How	
  do	
  applicaSons	
  handle	
  security	
  ?	
  
•    Do	
  they	
  store	
  informaSon	
  securely	
  ?	
  
•    What	
  informaSon	
  do	
  they	
  share	
  ?	
  
•    Are	
  the	
  markets/app	
  stores	
  safe	
  ?	
  
OWASP	
  Top	
  10	
  Mobile	
  Risks	
  
                  Release	
  Candidate	
  v1.0	
  
    •    Insecure	
  Data	
  Storage	
  
    •    Weak	
  Server	
  Side	
  Controls	
  
    •    Insufficient	
  Transport	
  Layer	
  ProtecSon	
  
    •    Client	
  Side	
  InjecSon	
  
    •    Poor	
  AuthorizaSon	
  and	
  AuthenScaSon	
  
    •    Improper	
  Session	
  Handling	
  
    •    Security	
  Decisions	
  Via	
  Untrusted	
  Inputs	
  
    •    Side	
  Channel	
  Data	
  Leakage	
  
    •    Broken	
  Cryptography	
  
    •    SensiSve	
  InformaSon	
  Disclosure	
  


h>ps://www.owasp.org/index.php/OWASP_Mobile_Security_Project	
  
h>p://threatpost.com/en_us/blogs/wells-­‐fargo-­‐boa-­‐cited-­‐lax-­‐mobile-­‐app-­‐security-­‐110510	
  
h>p://www.androidpolice.com/2011/10/01/massive-­‐security-­‐vulnerability-­‐in-­‐htc-­‐android-­‐devices-­‐evo-­‐3d-­‐4g-­‐thunderbolt-­‐others-­‐exposes-­‐phone-­‐numbers-­‐gps-­‐sms-­‐
emails-­‐addresses-­‐much-­‐more/	
  
h>ps://superevr.com/blog/2011/xss-­‐in-­‐skype-­‐for-­‐ios/	
  
h>p://www.androidpolice.com/2011/04/14/exclusive-­‐vulnerability-­‐in-­‐skype-­‐for-­‐android-­‐is-­‐exposing-­‐your-­‐name-­‐phone-­‐number-­‐chat-­‐logs-­‐and-­‐a-­‐lot-­‐more/	
  
h>p://www.androidpolice.com/2011/04/14/exclusive-­‐vulnerability-­‐in-­‐skype-­‐for-­‐android-­‐is-­‐exposing-­‐your-­‐name-­‐phone-­‐number-­‐chat-­‐logs-­‐and-­‐a-­‐lot-­‐more/	
  
Markets	
  and	
  App	
  Stores	
  
h>p://www.darkreading.com/insider-­‐threat/167801100/security/vulnerabiliSes/228201093/google-­‐issuing-­‐fix-­‐for-­‐latest-­‐android-­‐vulnerability-­‐disclosure.html	
  
h>p://news.cnet.com/8301-­‐27080_3-­‐10446402-­‐245.html	
  
h>p://threatpost.com/en_us/blogs/new-­‐ios-­‐bug-­‐lets-­‐apps-­‐run-­‐unsigned-­‐code-­‐110711	
  
h>p://www.kaspersky.co.uk/news?id=207576416	
  
h>p://www.darkreading.com/authenScaSon/167901072/security/news/231500422/gingermaster-­‐is-­‐first-­‐malware-­‐to-­‐uSlize-­‐a-­‐root-­‐exploit-­‐on-­‐android-­‐2-­‐3.html	
  
Other	
  Malicious	
  Soyware	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
h>p://www.securelist.com/en/analysis/204792194/ZeuS_in_the_Mobile_Facts_and_Theories	
  
Bo>om	
  line…	
  
•    Apps	
  are	
  leaking	
  private	
  informaSon	
  
•    InformaSon	
  is	
  not	
  stored	
  securely	
  
•    Have	
  security	
  vulnerabiliSes	
  
•    Some	
  include	
  malware	
  
•    Android	
  malware	
  is	
  on	
  the	
  rise	
  
•    Apps	
  circumvent	
  security	
  features	
  
•    ValidaSng	
  apps	
  is	
  not	
  enough	
  
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Given	
  a	
  choice	
  between	
  dancing	
  pigs	
  and	
  
       security,	
  users	
  will	
  pick	
  dancing	
  pigs	
  every	
  8me	
  




Gary	
  McGraw	
  and	
  Edward	
  Felten:	
  Securing	
  Java	
  (John	
  Wiley	
  &	
  Sons,	
  1999;	
  ISBN	
  0-­‐471-­‐31952-­‐X),	
  
Chapter	
  one,	
  Part	
  seven	
  
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
Users	
  

ApplicaSons	
  

      OS	
  

 Transport	
  

Transmission	
  

  Physical	
  
Wrap	
  Up	
  
Wrap	
  Up	
  
•  Users	
  trust	
  by	
  default	
  
•  Apps	
  sSll	
  have	
  room	
  for	
  improvement	
  
   (security	
  wise)	
  J	
  
•  Mobile	
  devices	
  are	
  becoming	
  a	
  mainstream	
  
   target	
  for	
  malware	
  
•  Hardware	
  has	
  longer	
  longevity	
  than	
  the	
  OS	
  
•  Lower	
  layers	
  are	
  not	
  helping	
  

          Mobile	
  security	
  is	
  sSll	
  in	
  its	
  infancy	
  
Thanks!	
  




   Q&A	
  
Pedro	
  Cabrita 	
  <pfcabrita@gmail.com>	
  
Bruno	
  Morisson 	
  	
  <morisson@genhex.org>	
  

Mais conteúdo relacionado

Semelhante a Mobile Securty - An Oxymoron?

Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
AppSec is Eating Security
AppSec is Eating SecurityAppSec is Eating Security
AppSec is Eating SecurityAlex Stamos
 
Brighttalk what should we be monitoring - final
Brighttalk   what should we be monitoring - finalBrighttalk   what should we be monitoring - final
Brighttalk what should we be monitoring - finalAndrew White
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Simen Sommerfeldt
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdNipun Jaswal
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009Mobile Web Apps Best Practices Presentation at Design4Mobile 2009
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009Jeff Sonstein
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxtmbainjr131
 

Semelhante a Mobile Securty - An Oxymoron? (20)

Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
AppSec is Eating Security
AppSec is Eating SecurityAppSec is Eating Security
AppSec is Eating Security
 
Brighttalk what should we be monitoring - final
Brighttalk   what should we be monitoring - finalBrighttalk   what should we be monitoring - final
Brighttalk what should we be monitoring - final
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009Mobile Web Apps Best Practices Presentation at Design4Mobile 2009
Mobile Web Apps Best Practices Presentation at Design4Mobile 2009
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 

Mais de morisson

Security asap
Security asapSecurity asap
Security asapmorisson
 
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using sshmorisson
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
Honeypot Farms using Ethernet Bridging over a TCP Connection
Honeypot Farms using Ethernet Bridging over a TCP Connection Honeypot Farms using Ethernet Bridging over a TCP Connection
Honeypot Farms using Ethernet Bridging over a TCP Connection morisson
 
Virtualization & Security
Virtualization & SecurityVirtualization & Security
Virtualization & Securitymorisson
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgerymorisson
 

Mais de morisson (7)

Security asap
Security asapSecurity asap
Security asap
 
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
 
APT
APTAPT
APT
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Honeypot Farms using Ethernet Bridging over a TCP Connection
Honeypot Farms using Ethernet Bridging over a TCP Connection Honeypot Farms using Ethernet Bridging over a TCP Connection
Honeypot Farms using Ethernet Bridging over a TCP Connection
 
Virtualization & Security
Virtualization & SecurityVirtualization & Security
Virtualization & Security
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgery
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 

Mobile Securty - An Oxymoron?