ºÝºÝߣshows by User: rafelivgi / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: rafelivgi / Tue, 28 Mar 2017 18:43:18 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: rafelivgi Java secure development part 3 /slideshow/java-secure-development-part-3/73808221 javasecuredevelopment-part3-170328184318
Java secure development part 3]]>

Java secure development part 3]]>
Tue, 28 Mar 2017 18:43:18 GMT /slideshow/java-secure-development-part-3/73808221 rafelivgi@slideshare.net(rafelivgi) Java secure development part 3 rafelivgi Java secure development part 3 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part3-170328184318-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Java secure development part 3
Java secure development part 3 from Rafel Ivgi
]]>
477 2 https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part3-170328184318-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Java secure development part 2 /slideshow/java-secure-development-part-2/73808191 javasecuredevelopment-part2-170328184221
Java secure development part 2]]>

Java secure development part 2]]>
Tue, 28 Mar 2017 18:42:21 GMT /slideshow/java-secure-development-part-2/73808191 rafelivgi@slideshare.net(rafelivgi) Java secure development part 2 rafelivgi Java secure development part 2 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part2-170328184221-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Java secure development part 2
Java secure development part 2 from Rafel Ivgi
]]>
286 2 https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part2-170328184221-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Java secure development part 1 /slideshow/java-secure-development-part-1/73807998 javasecuredevelopment-part1-170328183640
Java secure development part 1]]>

Java secure development part 1]]>
Tue, 28 Mar 2017 18:36:39 GMT /slideshow/java-secure-development-part-1/73807998 rafelivgi@slideshare.net(rafelivgi) Java secure development part 1 rafelivgi Java secure development part 1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part1-170328183640-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Java secure development part 1
Java secure development part 1 from Rafel Ivgi
]]>
473 2 https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part1-170328183640-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Implementing and auditing security controls part 2 /slideshow/implementing-and-auditing-security-controls-part-2/73801801 implementingandauditingsecuritycontrols-part2-170328164334
Implementing and auditing security controls part 2]]>

Implementing and auditing security controls part 2]]>
Tue, 28 Mar 2017 16:43:34 GMT /slideshow/implementing-and-auditing-security-controls-part-2/73801801 rafelivgi@slideshare.net(rafelivgi) Implementing and auditing security controls part 2 rafelivgi Implementing and auditing security controls part 2 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/implementingandauditingsecuritycontrols-part2-170328164334-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Implementing and auditing security controls part 2
Implementing and auditing security controls part 2 from Rafel Ivgi
]]>
1215 7 https://cdn.slidesharecdn.com/ss_thumbnails/implementingandauditingsecuritycontrols-part2-170328164334-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Implementing and auditing security controls part 1 /slideshow/implementing-and-auditing-security-controls-part-1/73799303 implementingandauditingsecuritycontrols-part1-170328160745
Implementing and auditing security controls part 1]]>

Implementing and auditing security controls part 1]]>
Tue, 28 Mar 2017 16:07:45 GMT /slideshow/implementing-and-auditing-security-controls-part-1/73799303 rafelivgi@slideshare.net(rafelivgi) Implementing and auditing security controls part 1 rafelivgi Implementing and auditing security controls part 1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/implementingandauditingsecuritycontrols-part1-170328160745-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Implementing and auditing security controls part 1
Implementing and auditing security controls part 1 from Rafel Ivgi
]]>
510 4 https://cdn.slidesharecdn.com/ss_thumbnails/implementingandauditingsecuritycontrols-part1-170328160745-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Siem &amp; log management /slideshow/siem-amp-log-management/73764351 siemlogmanagement-170328044502
Siem &amp; log management]]>

Siem &amp; log management]]>
Tue, 28 Mar 2017 04:45:01 GMT /slideshow/siem-amp-log-management/73764351 rafelivgi@slideshare.net(rafelivgi) Siem &amp; log management rafelivgi Siem &amp; log management <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/siemlogmanagement-170328044502-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Siem &amp;amp; log management
Siem &amp; log management from Rafel Ivgi
]]>
544 2 https://cdn.slidesharecdn.com/ss_thumbnails/siemlogmanagement-170328044502-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ciso back to the future - network vulnerabilities /slideshow/ciso-back-to-the-future-network-vulnerabilities-73764112/73764112 ciso-backtothefuture-networkvulnerabilities-170328044242
Ciso back to the future - network vulnerabilities]]>

Ciso back to the future - network vulnerabilities]]>
Tue, 28 Mar 2017 04:42:42 GMT /slideshow/ciso-back-to-the-future-network-vulnerabilities-73764112/73764112 rafelivgi@slideshare.net(rafelivgi) Ciso back to the future - network vulnerabilities rafelivgi Ciso back to the future - network vulnerabilities <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ciso-backtothefuture-networkvulnerabilities-170328044242-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ciso back to the future - network vulnerabilities
Ciso back to the future - network vulnerabilities from Rafel Ivgi
]]>
141 2 https://cdn.slidesharecdn.com/ss_thumbnails/ciso-backtothefuture-networkvulnerabilities-170328044242-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Issa security in a virtual world /slideshow/issa-security-in-a-virtual-world-73764110/73764110 issa-securityinavirtualworld-170328044240
Issa security in a virtual world]]>

Issa security in a virtual world]]>
Tue, 28 Mar 2017 04:42:40 GMT /slideshow/issa-security-in-a-virtual-world-73764110/73764110 rafelivgi@slideshare.net(rafelivgi) Issa security in a virtual world rafelivgi Issa security in a virtual world <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/issa-securityinavirtualworld-170328044240-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Issa security in a virtual world
Issa security in a virtual world from Rafel Ivgi
]]>
125 2 https://cdn.slidesharecdn.com/ss_thumbnails/issa-securityinavirtualworld-170328044240-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Darknet /rafelivgi/darknet-73764099 darknet-170328044235
Darknet]]>

Darknet]]>
Tue, 28 Mar 2017 04:42:35 GMT /rafelivgi/darknet-73764099 rafelivgi@slideshare.net(rafelivgi) Darknet rafelivgi Darknet <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/darknet-170328044235-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Darknet
Darknet from Rafel Ivgi
]]>
564 2 https://cdn.slidesharecdn.com/ss_thumbnails/darknet-170328044235-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber crime /slideshow/cyber-crime-73764082/73764082 cybercrime-170328044223
Cyber crime]]>

Cyber crime]]>
Tue, 28 Mar 2017 04:42:23 GMT /slideshow/cyber-crime-73764082/73764082 rafelivgi@slideshare.net(rafelivgi) Cyber crime rafelivgi Cyber crime <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybercrime-170328044223-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber crime
Cyber crime from Rafel Ivgi
]]>
593 7 https://cdn.slidesharecdn.com/ss_thumbnails/cybercrime-170328044223-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber attacks 101 /rafelivgi/cyber-attacks-101-73763819 cyberattacks101-170328044008
Cyber attacks 101]]>

Cyber attacks 101]]>
Tue, 28 Mar 2017 04:40:08 GMT /rafelivgi/cyber-attacks-101-73763819 rafelivgi@slideshare.net(rafelivgi) Cyber attacks 101 rafelivgi Cyber attacks 101 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberattacks101-170328044008-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber attacks 101
Cyber attacks 101 from Rafel Ivgi
]]>
207 4 https://cdn.slidesharecdn.com/ss_thumbnails/cyberattacks101-170328044008-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacker techniques, exploit and incident handling /slideshow/hacker-techniques-exploit-and-incident-handling-73763804/73763804 hackertechniquesexploitandincidenthandling-170328044000
Hacker techniques, exploit and incident handling]]>

Hacker techniques, exploit and incident handling]]>
Tue, 28 Mar 2017 04:40:00 GMT /slideshow/hacker-techniques-exploit-and-incident-handling-73763804/73763804 rafelivgi@slideshare.net(rafelivgi) Hacker techniques, exploit and incident handling rafelivgi Hacker techniques, exploit and incident handling <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackertechniquesexploitandincidenthandling-170328044000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Hacker techniques, exploit and incident handling
Hacker techniques, exploit and incident handling from Rafel Ivgi
]]>
1062 4 https://cdn.slidesharecdn.com/ss_thumbnails/hackertechniquesexploitandincidenthandling-170328044000-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top 10 mistakes running a windows network /slideshow/top-10-mistakes-running-a-windows-network-73763754/73763754 top10mistakes-runningawindowsnetwork-170328043935
Top 10 mistakes running a windows network]]>

Top 10 mistakes running a windows network]]>
Tue, 28 Mar 2017 04:39:35 GMT /slideshow/top-10-mistakes-running-a-windows-network-73763754/73763754 rafelivgi@slideshare.net(rafelivgi) Top 10 mistakes running a windows network rafelivgi Top 10 mistakes running a windows network <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/top10mistakes-runningawindowsnetwork-170328043935-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Top 10 mistakes running a windows network
Top 10 mistakes running a windows network from Rafel Ivgi
]]>
99 2 https://cdn.slidesharecdn.com/ss_thumbnails/top10mistakes-runningawindowsnetwork-170328043935-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced web application hacking and exploitation /slideshow/advanced-web-application-hacking-and-exploitation-73763660/73763660 advancedwebapplicationhackingandexploitation-170328043843
Advanced web application hacking and exploitation]]>

Advanced web application hacking and exploitation]]>
Tue, 28 Mar 2017 04:38:43 GMT /slideshow/advanced-web-application-hacking-and-exploitation-73763660/73763660 rafelivgi@slideshare.net(rafelivgi) Advanced web application hacking and exploitation rafelivgi Advanced web application hacking and exploitation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/advancedwebapplicationhackingandexploitation-170328043843-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Advanced web application hacking and exploitation
Advanced web application hacking and exploitation from Rafel Ivgi
]]>
1634 10 https://cdn.slidesharecdn.com/ss_thumbnails/advancedwebapplicationhackingandexploitation-170328043843-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic /slideshow/firmitas-cyber-solutions-mirai-botnet-basic-facts-on-a-worldwide-epidemic/72983203 firmitas-miraibotnet-afewbasicfactsonaworld-wideepidemic-170309114630
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic 500,000 Vulnerable Devices More than 500k of vulnerable devices found globally. The malware exploited 62 default router & camera passwords, as well as TR-064 and TR-069 OS Command-Injection vulnerabilities. 120,000 Successful Infections (per day) 72,000 unique IPs infected in 12 hours, ~4000 new IPs per hour. The worm is still running and new variants of it are released daily into the wild taking over more devices. Most of the devices are home /office routers, and CCTV cameras. 1.5 Tbps - Mirai: DDoS Record-Holder Until Mirai, the world-record DDoS attacks reached 600 Gbps. In 2014, the the average size of a DDoS attack was 7.39 Gbps. 2015 saw an increase to 500 Gbps. In October 2016, Mirai ascended to the next level. Mirai vs. Other IoT Botnets Mirai - 500k infections, 1.5 Tbps DDoS GayFgt/LizKebab/Torlus/Kaiten/Tsunami/PNScan/Qbot - 120k infections, 655 Gbps DDoS Linux/IRCTelnet (new Aidra) - 3.5k infections, 100.5 Gbps DDoS LizardStresser - 118k infections, 400 Gbps DDoS Aidra (Carna/Darlloz) - 420k infections, 1.26 Tbps DDoS Home & office routers, CCTV cameras, smart watches, and the IoT devices of the new era are becoming the main targets for remote takeover. DDoS and Crypto-Currency mining are main reasons, but the future holds more "attractions", more risks, and more target devices. Firmitas solutions can be used to actively protect IoT devices, and prevent any unexpected/unintended behavior.]]>

Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic 500,000 Vulnerable Devices More than 500k of vulnerable devices found globally. The malware exploited 62 default router & camera passwords, as well as TR-064 and TR-069 OS Command-Injection vulnerabilities. 120,000 Successful Infections (per day) 72,000 unique IPs infected in 12 hours, ~4000 new IPs per hour. The worm is still running and new variants of it are released daily into the wild taking over more devices. Most of the devices are home /office routers, and CCTV cameras. 1.5 Tbps - Mirai: DDoS Record-Holder Until Mirai, the world-record DDoS attacks reached 600 Gbps. In 2014, the the average size of a DDoS attack was 7.39 Gbps. 2015 saw an increase to 500 Gbps. In October 2016, Mirai ascended to the next level. Mirai vs. Other IoT Botnets Mirai - 500k infections, 1.5 Tbps DDoS GayFgt/LizKebab/Torlus/Kaiten/Tsunami/PNScan/Qbot - 120k infections, 655 Gbps DDoS Linux/IRCTelnet (new Aidra) - 3.5k infections, 100.5 Gbps DDoS LizardStresser - 118k infections, 400 Gbps DDoS Aidra (Carna/Darlloz) - 420k infections, 1.26 Tbps DDoS Home & office routers, CCTV cameras, smart watches, and the IoT devices of the new era are becoming the main targets for remote takeover. DDoS and Crypto-Currency mining are main reasons, but the future holds more "attractions", more risks, and more target devices. Firmitas solutions can be used to actively protect IoT devices, and prevent any unexpected/unintended behavior.]]>
Thu, 09 Mar 2017 11:46:29 GMT /slideshow/firmitas-cyber-solutions-mirai-botnet-basic-facts-on-a-worldwide-epidemic/72983203 rafelivgi@slideshare.net(rafelivgi) Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic rafelivgi Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic 500,000 Vulnerable Devices More than 500k of vulnerable devices found globally. The malware exploited 62 default router & camera passwords, as well as TR-064 and TR-069 OS Command-Injection vulnerabilities. 120,000 Successful Infections (per day) 72,000 unique IPs infected in 12 hours, ~4000 new IPs per hour. The worm is still running and new variants of it are released daily into the wild taking over more devices. Most of the devices are home /office routers, and CCTV cameras. 1.5 Tbps - Mirai: DDoS Record-Holder Until Mirai, the world-record DDoS attacks reached 600 Gbps. In 2014, the the average size of a DDoS attack was 7.39 Gbps. 2015 saw an increase to 500 Gbps. In October 2016, Mirai ascended to the next level. Mirai vs. Other IoT Botnets Mirai - 500k infections, 1.5 Tbps DDoS GayFgt/LizKebab/Torlus/Kaiten/Tsunami/PNScan/Qbot - 120k infections, 655 Gbps DDoS Linux/IRCTelnet (new Aidra) - 3.5k infections, 100.5 Gbps DDoS LizardStresser - 118k infections, 400 Gbps DDoS Aidra (Carna/Darlloz) - 420k infections, 1.26 Tbps DDoS Home & office routers, CCTV cameras, smart watches, and the IoT devices of the new era are becoming the main targets for remote takeover. DDoS and Crypto-Currency mining are main reasons, but the future holds more "attractions", more risks, and more target devices. Firmitas solutions can be used to actively protect IoT devices, and prevent any unexpected/unintended behavior. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/firmitas-miraibotnet-afewbasicfactsonaworld-wideepidemic-170309114630-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic 500,000 Vulnerable Devices More than 500k of vulnerable devices found globally. The malware exploited 62 default router &amp; camera passwords, as well as TR-064 and TR-069 OS Command-Injection vulnerabilities. 120,000 Successful Infections (per day) 72,000 unique IPs infected in 12 hours, ~4000 new IPs per hour. The worm is still running and new variants of it are released daily into the wild taking over more devices. Most of the devices are home /office routers, and CCTV cameras. 1.5 Tbps - Mirai: DDoS Record-Holder Until Mirai, the world-record DDoS attacks reached 600 Gbps. In 2014, the the average size of a DDoS attack was 7.39 Gbps. 2015 saw an increase to 500 Gbps. In October 2016, Mirai ascended to the next level. Mirai vs. Other IoT Botnets Mirai - 500k infections, 1.5 Tbps DDoS GayFgt/LizKebab/Torlus/Kaiten/Tsunami/PNScan/Qbot - 120k infections, 655 Gbps DDoS Linux/IRCTelnet (new Aidra) - 3.5k infections, 100.5 Gbps DDoS LizardStresser - 118k infections, 400 Gbps DDoS Aidra (Carna/Darlloz) - 420k infections, 1.26 Tbps DDoS Home &amp; office routers, CCTV cameras, smart watches, and the IoT devices of the new era are becoming the main targets for remote takeover. DDoS and Crypto-Currency mining are main reasons, but the future holds more &quot;attractions&quot;, more risks, and more target devices. Firmitas solutions can be used to actively protect IoT devices, and prevent any unexpected/unintended behavior.
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on a world-wide epidemic from Rafel Ivgi
]]>
181 6 https://cdn.slidesharecdn.com/ss_thumbnails/firmitas-miraibotnet-afewbasicfactsonaworld-wideepidemic-170309114630-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities /slideshow/firmitas-cyber-solutions-scada-cyberrisk-fact-of-fiction/72983200 icsscadavulnerabilities-infographic-170309114625
SCADA Cyber-Risk: Fact or Fiction? Vulnerabilities vs. Incidents Firmitas Presenting a New Approach Attacks on Industrial Control Systems are growing threat on critical-infrastructure. No current technology can keep up with the upward trend of reported vulnerabilities, and incidents based on such vulnerabilities. This trend forces a new approach for securing mission-critical systems ... Device-Side Protection The targets of the attacks are the devices themselves. Thus the devices must be protected rather than the computer sending the commands. Prevention Firmitas focuses on protection by prevention evolving from the well-known limitations of existing detection and situational-awareness technologies. Deterministic Firmitas deterministic solution is based on the pre-defined communication model of the specific target system. Free from the limitations of updates, signatures, or heuristics.]]>

SCADA Cyber-Risk: Fact or Fiction? Vulnerabilities vs. Incidents Firmitas Presenting a New Approach Attacks on Industrial Control Systems are growing threat on critical-infrastructure. No current technology can keep up with the upward trend of reported vulnerabilities, and incidents based on such vulnerabilities. This trend forces a new approach for securing mission-critical systems ... Device-Side Protection The targets of the attacks are the devices themselves. Thus the devices must be protected rather than the computer sending the commands. Prevention Firmitas focuses on protection by prevention evolving from the well-known limitations of existing detection and situational-awareness technologies. Deterministic Firmitas deterministic solution is based on the pre-defined communication model of the specific target system. Free from the limitations of updates, signatures, or heuristics.]]>
Thu, 09 Mar 2017 11:46:24 GMT /slideshow/firmitas-cyber-solutions-scada-cyberrisk-fact-of-fiction/72983200 rafelivgi@slideshare.net(rafelivgi) Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities rafelivgi SCADA Cyber-Risk: Fact or Fiction? Vulnerabilities vs. Incidents Firmitas Presenting a New Approach Attacks on Industrial Control Systems are growing threat on critical-infrastructure. No current technology can keep up with the upward trend of reported vulnerabilities, and incidents based on such vulnerabilities. This trend forces a new approach for securing mission-critical systems ... Device-Side Protection The targets of the attacks are the devices themselves. Thus the devices must be protected rather than the computer sending the commands. Prevention Firmitas focuses on protection by prevention evolving from the well-known limitations of existing detection and situational-awareness technologies. Deterministic Firmitas deterministic solution is based on the pre-defined communication model of the specific target system. Free from the limitations of updates, signatures, or heuristics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icsscadavulnerabilities-infographic-170309114625-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SCADA Cyber-Risk: Fact or Fiction? Vulnerabilities vs. Incidents Firmitas Presenting a New Approach Attacks on Industrial Control Systems are growing threat on critical-infrastructure. No current technology can keep up with the upward trend of reported vulnerabilities, and incidents based on such vulnerabilities. This trend forces a new approach for securing mission-critical systems ... Device-Side Protection The targets of the attacks are the devices themselves. Thus the devices must be protected rather than the computer sending the commands. Prevention Firmitas focuses on protection by prevention evolving from the well-known limitations of existing detection and situational-awareness technologies. Deterministic Firmitas deterministic solution is based on the pre-defined communication model of the specific target system. Free from the limitations of updates, signatures, or heuristics.
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities from Rafel Ivgi
]]>
126 2 https://cdn.slidesharecdn.com/ss_thumbnails/icsscadavulnerabilities-infographic-170309114625-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
United States O1 Visa Approval /slideshow/united-states-o1-visa-approval/12536775 unitedstatedo1visaapproval-120414041944-phpapp01
The United States Government acknowledging my professional skills in technology and the information security field as equivalent more than a B.Sc and approving me an O1 Visa.]]>

The United States Government acknowledging my professional skills in technology and the information security field as equivalent more than a B.Sc and approving me an O1 Visa.]]>
Sat, 14 Apr 2012 04:19:42 GMT /slideshow/united-states-o1-visa-approval/12536775 rafelivgi@slideshare.net(rafelivgi) United States O1 Visa Approval rafelivgi The United States Government acknowledging my professional skills in technology and the information security field as equivalent more than a B.Sc and approving me an O1 Visa. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/unitedstatedo1visaapproval-120414041944-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The United States Government acknowledging my professional skills in technology and the information security field as equivalent more than a B.Sc and approving me an O1 Visa.
United States O1 Visa Approval from Rafel Ivgi
]]>
2168 2 https://cdn.slidesharecdn.com/ss_thumbnails/unitedstatedo1visaapproval-120414041944-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comptia Security+ CE Certificate /slideshow/comptia-security-ce-certificate-12536623/12536623 comptiasecuritypluscecertificate-120414040531-phpapp01
]]>

]]>
Sat, 14 Apr 2012 04:05:29 GMT /slideshow/comptia-security-ce-certificate-12536623/12536623 rafelivgi@slideshare.net(rafelivgi) Comptia Security+ CE Certificate rafelivgi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/comptiasecuritypluscecertificate-120414040531-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Comptia Security+ CE Certificate from Rafel Ivgi
]]>
1088 5 https://cdn.slidesharecdn.com/ss_thumbnails/comptiasecuritypluscecertificate-120414040531-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ISACA Membership /slideshow/finjan-20042005/12536575 isaca-13343935298536-phpapp02-120414035940-phpapp02
]]>

]]>
Sat, 14 Apr 2012 03:59:10 GMT /slideshow/finjan-20042005/12536575 rafelivgi@slideshare.net(rafelivgi) ISACA Membership rafelivgi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isaca-13343935298536-phpapp02-120414035940-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
ISACA Membership from Rafel Ivgi
]]>
455 2 https://cdn.slidesharecdn.com/ss_thumbnails/isaca-13343935298536-phpapp02-120414035940-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CISSP https://de.slideshare.net/rafelivgi/cissp-12536519 cissp-13343932333034-phpapp02-120414034734-phpapp02
]]>

]]>
Sat, 14 Apr 2012 03:47:18 GMT https://de.slideshare.net/rafelivgi/cissp-12536519 rafelivgi@slideshare.net(rafelivgi) CISSP rafelivgi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cissp-13343932333034-phpapp02-120414034734-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
from Rafel Ivgi
]]>
1283 3 https://cdn.slidesharecdn.com/ss_thumbnails/cissp-13343932333034-phpapp02-120414034734-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-rafelivgi-48x48.jpg?cb=1682069528 Rafel Ivgi is a Strategy, Marketing, Business Development, Management and entrepreneurship professional, evolved from being a programmer, hacker, researcher. Today, Rafel focuses on a mix of business strategy, business development, market research, product branding, product management and marketing strategies. Entrepreneur, hand-on business builder focused on driving growth via strong strategic planning and execution skills. A leader with strong people skills, storytelling, innovation and business development acumen. Successful track record of strategic planning, identification and development of new growth engines in medium and large international B2B companies. KEY EXPERTISE • New ven... http://www.defensia.co.il https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part3-170328184318-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/java-secure-development-part-3/73808221 Java secure developmen... https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part2-170328184221-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/java-secure-development-part-2/73808191 Java secure developmen... https://cdn.slidesharecdn.com/ss_thumbnails/javasecuredevelopment-part1-170328183640-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/java-secure-development-part-1/73807998 Java secure developmen...