SlideShare une entreprise Scribd logo
1  sur  9
Social Media Security Challenges Aleksandr Yampolskiy, Ph.D. (Gilt Groupe)
Quick Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Social Media?
Benefits of Social Media Reach out to customers quicker Brand recognition Recruiting
Risks of Social Media Twitter XSS bug Myspace Samy worm Facebook spear-phishing Facebook page of MI6 chief’s wife
Pros/Cons of Social Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Threat Matrix For Social Media Data leakage  on Twitter Facebook malware Spear-phishing
Social media security challenges

Contenu connexe

Tendances

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubOutserveWeb
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in ManagementThomas Clifford
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsOutserveWeb
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networkingFort Rucker FRSA
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success OsaProtingentDan
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12Alex Lawrence
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Philip Oakley
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCOSevans Strategy
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpointszyarto
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterAnvil Media, Inc.
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Spiderworking
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media SafetyChad Warner
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011PasocoPteLtd
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures Bryan Fendley
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalDigital Firefly Marketing
 

Tendances (20)

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural Hub
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in Management
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business Skills
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success Osa
 
6 online identity
6 online identity6 online identity
6 online identity
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCO
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpoint
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Learning in a VUCA world
Learning in a VUCA worldLearning in a VUCA world
Learning in a VUCA world
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.final
 

Similaire à Social media security challenges

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoWise Elephant
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slidesagbegin
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketingSarah Maynard
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdectmacuk
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationNathan Wright
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSandra Masters
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMohamed Mahdy
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small BusinessJay Massey
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Researchmabar207
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentationLeedsMet_CR
 

Similaire à Social media security challenges (20)

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketing
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdec
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University West
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media Risk
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small Business
 
Social Technology Overview with Case Studies
Social Technology Overview with Case StudiesSocial Technology Overview with Case Studies
Social Technology Overview with Case Studies
 
Terenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case StudiesTerenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case Studies
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Research
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentation
 

Plus de Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsAleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItAleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of virusesAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topologyAleksandr Yampolskiy
 

Plus de Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Social media security challenges