SlideShare a Scribd company logo
1 of 23
Download to read offline
ITSECURITYITSECURITY
HORROR
STORIES
WHEREFOUNDATIONALCONTROLSWENT
OVERLOOKED
WHEREFOUNDATIONALCONTROLSWENT
OVERLOOKED
or
Weaskedindustryprofessionalsabout
themomentsintheirsecuritycareers
thathorrifiedorshockedthemso
much,theydidn'tknowwhetherto...

horrified shocked
Thisparticularorganizationpaid
theiremployeesbonusesbased
ontheamountofmoneythey
savedfromtheirbudgets!
Therefore,insteadoftryingto
picksecuritysolutionsthat
helpedbettertheirsecurity
posture,theychosetodothe
minimumrequiredtobe
compliant...
-IRFAHN KHIMJI
@THEREALKHIMJI
...Theypitchedagreat
storytotheexecutives
tosaythatbeing
compliantwiththePCI
standardmadethem
secure,buttheywere
horriblymistaken.
-IRFAHN KHIMJI
@THEREALKHIMJI
Wewereinastaffmeetingwhenoneoftheengineers
receivedacallfromourISPtonotifyaboutsuspicioustraffic.
Theirmonitoringteamobservedthataserveronour
environmentwascommunicatingwithaknownmalicious
command-and-controlserverinanothercountry...
-KEIRSTEN BRAGER
@HIDDENCYBFIGURE
...Theincidentresponseplan:pull
theserveroffthenetwork.Makes
sense,right?Therewasonesmall
problem:noonecouldfindtheserver.
-KEIRSTEN BRAGER
@HIDDENCYBFIGURE
Iwasdoingaphysicalsecurity
assessmentforthiscompany,
andoneofthetaskswas
reviewingtheserverroom.The
'serverroom'wasjustanother
officethathappenedtocontaina
serverrackinarepurposedcloset
withdoorsremoved,whichwas
opentoallemployees‒
unfortunately,thisistypicaland
notwhatstoodouttome...
-Zoë Rose
@5683MONKEY
Come in, WE’RE
OPEN
...Therealdishearteningpart
wastherewasawindow
directlybesidetheserverrack‒
noscreenorbars‒onthe
groundlevel...Ifyouwanted,
youcoulddoallyoursysadmin
taskswhilesittingoutsidefora
picnic.Or,ifyouwanted,you
couldwalkbythebuilding,
pluginarandomUSB,andno
onewouldbethewiser.-Zoë Rose
@5683MONKEY
IamremindedofthetimeIgainedaccess
toabuilding,connectedontotheir
network,andfound'CreditCardsFront
andBack.pdf.'Thiswas,ofcourse,acopy
oftheirstaffcreditcards.
-RICHARD DE VERE
@RFDEVERE
An'IT'staffmembercametoan
officewearingajacketthatsaid
ITonthebackandrequested
accesstotheservercloset.The
frontdeskpersonnelasked
themtosigninbutallowed
themtoenterwithoutanID
check.Roughlyanhourlater,
the'IT'persondepartedthe
officeandthingsstartedtogo
verybadly...
-HUDSON HARRIS
@LEGALLEVITY
...Inshort,theofficeservers
gothitwithransomwareandall
operationsceased.Inthepost-
mortem,theindividualclaiming
tobepartoftheITstaffwrote
'hacker'onthesign-insheetand
wasactuallywearingashirtthat
saidhacker‒allveryobvious
andplain.
-HUDSON HARRIS
@LEGALLEVITY
Iwastaskedbyaclienttopentestawebapp,which
waspresentedtomeasasimpleloginform.Theclient
didnotprovideanylogincredentials.So,themain
goalwastotryandgainaccesstothesystem.
Ontheloginpage,therewasanemailaddress.Itread
somethinglike,'Ifyouhaveanyissuesloggingin,
emailthesiteadministratorjohn@example.com'...
-RYAN DEWHURST
@ethicalhack3r
...Myfirstthoughtwas,'Does
thisJohnfellowhaveanaccount
onthisapplication?'So,Itried
username=john@example.com,
password=password.Andloand
behold,itworked!Theclienthad
paidforseveraldaysandwas
quiteembarrassedthatitonly
tookmeabout5minutestogain
accesstotheirsystem.
-RYAN DEWHURST
@ethicalhack3r
Ihadtheunsavorytaskoflettingan
employeego.Unfortunately,this
personwasoneofoursysadmins,so
itwasabitofaprocessgetting
credentialschanged,etc.Afterallthe
appropriatechangesweremade,Isat
thispersondownandbrokethenews.
Iaskedthemtopacktheirthings,turn
intheirkeysandleave...
-JIM NITTERUER
@JNITTERUER
...Whiletheindividualwaspacking,Isteppedout
momentarilytousethebathroom.Igotcornered
talkingtosomeoneinthehallandreturned15minutes
laterexpectingtheformeremployeetobepackedand
readytogo.Instead,Ifoundhimconnectinghis
personallaptoptothenetworkandattemptingto
downloadhisarchivedworkfiles!
-JIM NITTERUER
@JNITTERUER
Thatmomentwhenyouareworkingforamassivemanaged
servicescompanyandyouareabouttouploadadebugfileto
thevendorofyourticketingsystemandfindoutyoucansee
alltheirclients'SFTPfoldersontheirdropsite.Globalbanks,
pharmaceuticalcompaniesanddefensecontractorsallhave
foldersyoucanaccess.Youquicklylookinyourownfolderto
seewhattheseothercompaniescanseeaboutyour
organization...
-EAN MEYER
@EANMEYER
...Notonlyhaveprofessionalservicesdroppedallyourarchitecturaldesigns,passwordsandCMDBdatatherebutalsoleftthelastonsiteprofessionalservicesrepresentative'sunlockedPSTfilethere‒itcontainsatreasuretroveofpasswords,usernames,businesscommunicationsandenoughcompanycultureinformationtomakeasocialengineerfaint.
-EAN MEYER
@EANMEYER
Whilstworkingforalargeenergy
companyintheUK,oneofmyroles
inInformationSecuritywastovisit
offshoresitesandconducttechnical
securityauditsbasedonISO27001.
Inoneofmyvisits,Iwenttoa
brand-newfacilityofoneofour
suppliers[toconductareview].As
partoftheaudit,Ireviewedsix
backupgeneratorsandhowoften
theyweretested,etc...
-PAUL PJ NORRIS
@PJNORRIS
...Iwasshockedtoseethattwo
ofthesixgeneratorswererunning
atthetimeofmyvisit.Initially,I
wasinformedtheywerebeing
testedatthatmomentintime,but
subsequently,Ilearntthatthe
entiresitehadnotbeensupplied
commercialpowerfromthelocal
grid,soithadbeenrunningon
generatorpowerforthepastnine
months!
-PAUL PJ NORRIS
@PJNORRIS
Oneofmyfirsttasksatthis
companywastosetupaESXi
server.Ideployedtheserver
andhadnoissuesformonths.
Then,onedayIranaportscan
againstourpublicIPaddress
spaceandnoticedsomethinga
bitodd:awebsitebeinghosted
onapublicIPthatwasn't
supposedtobeused...
-TRAVIS SMITH
@MRTRAV
...Itturnsoutthatbeforemytenure,astagingwebserverhadbeensetupthathadaNATbetweenapublicIPandtheinternalIPIwasnowusingformyESXiserver.Whentheoriginalstagingserverwasdecommissioned,theNATruleinthefirewallwasneverremoved.IhadanESXiserverpubliclyavailablefromtheInternet.AtfirstIcried,butafterfixingtheissueandsiftingthroughlogsfordays,Ilaughedathowbadthatwas.
-TRAVIS SMITH
@MRTRAV
MORALOFTHESTORIES?
Muchofprotectingany
organizationisn'taboutmore
advanceddetectionornewtools,
butaboutconsistentlyapplyingthe
toolswealreadyknowwork.Doing
thebasicsrightisthefoundationof
informationsecurity.
MORALOFTHESTORIES?
-TIM ERLIN
@TERLIN
FORTHELATESTSECURITYNEWS,
TRENDSINSIGHTS,VISIT:
TRIPWIRE.COM/BLOG
FORTHELATESTSECURITYNEWS,
TRENDSINSIGHTS,VISIT:

More Related Content

Similar to IT Security Horror Stories: Where Foundational Security Controls Went Overlooked

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
ICheme Hazards AUS 2015_Final Programme - WEB
ICheme Hazards AUS 2015_Final Programme - WEBICheme Hazards AUS 2015_Final Programme - WEB
ICheme Hazards AUS 2015_Final Programme - WEBLiz Hallifax
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Christopher Lean APFS
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Christopher Lean APFS
 
Λάμπρος Τσόλκας, 11th Insurance Conference 2018
Λάμπρος Τσόλκας, 11th Insurance Conference 2018Λάμπρος Τσόλκας, 11th Insurance Conference 2018
Λάμπρος Τσόλκας, 11th Insurance Conference 2018Starttech Ventures
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure worldHP
 

Similar to IT Security Horror Stories: Where Foundational Security Controls Went Overlooked (8)

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
ICheme Hazards AUS 2015_Final Programme - WEB
ICheme Hazards AUS 2015_Final Programme - WEBICheme Hazards AUS 2015_Final Programme - WEB
ICheme Hazards AUS 2015_Final Programme - WEB
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Λάμπρος Τσόλκας, 11th Insurance Conference 2018
Λάμπρος Τσόλκας, 11th Insurance Conference 2018Λάμπρος Τσόλκας, 11th Insurance Conference 2018
Λάμπρος Τσόλκας, 11th Insurance Conference 2018
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure world
 
top journals
top journalstop journals
top journals
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

IT Security Horror Stories: Where Foundational Security Controls Went Overlooked