Most mobile apps require the ability to store data locally on a device to deal with the realities of a disconnected world where a ubiquitous wireless data network is non-existent. While many consumer apps can save light amounts of data as small files, the data requirements of mobile line-of-business apps is much greater. With Windows Phone 8.1 and Windows 8.1, and using MSOpenTech’s new portable wrapper for the embedded database, SQLite, C# and Visual Basic developers can build structured data storage into their apps. Join Rob as he walks you through creating local databases and tables and shows you how to work with offline data. We also take a quick look at the new local data sync capability in Microsoft Azure Mobile Services which uses SQLite for local data storage.
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.
Everything in the OWASP TOP 10 is covered in this session, including: Injections, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards.
В данной сессии подробно рассмотрены основные российские и европейские законодательные акты об обработке персональных данных. Также развенчаны популярные мифы о невозможности обработки персданных в облачных и виртуальных средах. В конце доклада даются ответы на наиболее насущные вопросы аудитории.