By: Redbrick DCU's Computer Networking Society
Opening of TechWeek 2017
By: Donal Hunt - Site Reliability Engineering Manager in Google Ireland
Virtually every company today uses firewalls to enforce perimeter security. However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company's privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. Google is taking a different approach to network security. We are removing the requirement for a privileged intranet and moving our corporate applications to the Internet.
By: Alan Neville
In late 2015, Symantec began investigating a suspicious piece of malware detected within a customers environment. Alan, a Senior Threat Intelligence Analyst takes you throguh the full investigation process, starting from a simple detection event to building out the bigger picture. The curious case of an Iranian actor or maybe two...
How IOT security has been developing over the last few years (it hasn't) and what flaws are typically seen in these devices
By: Ciaran McNally
In a server far far away, some blackhat alliance is enumerating your services in preparation for an attack. They are plnning the fall of your companies empire. We will discuss the open source intelligence techniques such enemies use to identify weaknesses in your armour and examine the processes involved in their penetratoon testing methodology
By: Conor - Circle CI
Writing code is only the start of the process. Getting it into production and keeping it up and running requires a lot of tooling and techniques. I'm going to give a quick tour through some of the things you need to do to turn software into a running product.
By: Cian Butler
What is Docker and why you should care. How does docker help you as a developer and how can it be used to speed up development and make your program more reliable