19-11-2017 04:01:30

Driving IT giver den 2. november 2018 et unikt indblik i it-verdenens konstante ændringer. og du kommer hjem med konkret og brugbar viden om IT og udvikling. Tilmeld dig nu.

Webinarer 2017

Her finder du alle webinarerne fra Driving IT 2017.
13. nov. 2017 Af: Driving IT
Attacking with HTTP requests ved Hanno Böck
Attacking with HTTP requests ved Hanno Böck

Simply trying to download files from webpages leads to a surprisingly devastating attack vector that causes database leaks, exposed private keys and much more. Eventually this also led to the disc ...

Se video
CHERI: A Hybrid Capability Architecture ved Robert Watson, Cambridge University
CHERI: A Hybrid Capability Architecture ved Robert Watson, Cambridge University

Over the last 8 years, a research team spanning SRI International and the University of Cambridge have worked to develop the security-oriented CHERI computer architecture, which naturally mitigate ...

Se video
Delightful Data Explotation ved Keld Norman, Dubex
Delightful Data Explotation ved Keld Norman, Dubex

Læg dagligdagen fra dig et øjeblik og tag med ind i de it-kriminelles verden i selskab med Danmarks mest underholdende it-sikkerhedsnørd. Keld Norman viser dig, hvor let det er at være hacker i vo ...

Se video
Lessons of the internet and computing for a future exponential world ved Brad Templeton, Singularity University
Lessons of the internet and computing for a future exponential world ved Brad Templeton, Singularity University

The internet and computer industries have lived with exponential change for many decades, and they have lessons to teach everything else about how it's done -- and even lessons to learn within the ...

Se video
Smart contracts are neither smart nor contracts ved Fritz Henglein, DIKU
Smart contracts are neither smart nor contracts ved Fritz Henglein, DIKU

Smart contracts are programs written in a Java-like language run on one of the dominant blockchain/distributed ledger systems. We discuss why this makes them neither contracts nor is it necessari ...

Se video
WannaCry – Global Ransomware attack overview ved Irena Damsky, ThreatSTOP
WannaCry – Global Ransomware attack overview ved Irena Damsky, ThreatSTOP

WannaCry has been an internet wide event causing thousands of infections worldwide in May 2017 - What happened? How did it happen? Who is behind it and why? Who got affected, and did they manage t ...

Se video
What is Cyber War, and how does it affect Denmark? ved Kenneth Geers, Nato Cyber center - via skype
What is Cyber War, and how does it affect Denmark? ved Kenneth Geers, Nato Cyber center - via skype

This talk discusses the connection between network security and national security, and the rise of cyberspace as a domain of international conflict.

Se video
Why don't danish websites treat visitors well ved Pritt Potter, Plumbr
Why don't danish websites treat visitors well ved Pritt Potter, Plumbr

This September, Plumbr built a team of robots that visited hundreds of Danish high volume web sites and found that many of them are too slow or even technically broken for some visitors. In his ta ...

Se video
XDP (eXpress Data Path) in the Linux kernel ved Jesper Brouer, Redhat (Keynote)
XDP (eXpress Data Path) in the Linux kernel ved Jesper Brouer, Redhat (Keynote)

Linux kernel networking have gotten a new eXpress Data Path (XDP), which is an earlier packet processing stage. It operates at the same speed as competing Kernel-bypass solutions. This talk gives ...

Se video
luk
close