<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
	<channel>
<title>Jean-Baptiste Bres - Blog</title><link>https://www.jbbres.com/index.html</link><description>Hot News&#x21;</description><dc:language>en</dc:language><language>en</language><dc:creator>Jean-Baptiste Bres</dc:creator><dc:date>2026-03-17T08:08:22+11:00</dc:date><admin:generatorAgent rdf:resource="http://www.realmacsoftware.com/" />
<sy:updatePeriod>hourly</sy:updatePeriod>
<sy:updateFrequency>1</sy:updateFrequency>
<sy:updateBase>2000-01-01T12:00+00:00</sy:updateBase>
<lastBuildDate>Sat, 6 Jan 2018 13:54:07 +1100</lastBuildDate><item><title>Cybersecurity Study Group: (ISC)&#xb2; Certified in Cybersecurity (CC) </title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><category>Certified in Cybersecurity</category><dc:date>2026-03-17T08:08:22+11:00</dc:date><link>https://www.jbbres.com/files/b0bacc6de60648cc9828fcfacaa80504-173.html#unique-entry-id-173</link><guid isPermaLink="true">https://www.jbbres.com/files/b0bacc6de60648cc9828fcfacaa80504-173.html#unique-entry-id-173</guid><content:encoded><![CDATA[Great to see the <a href="https://isc2chapter.org.au" target="_blank">ISC2 Sydney Chapter </a>launching its first pilot <strong>CC Study Group </strong>yesterday!<br />This initiative is all about helping members prepare for the <a href="https://www.isc2.org/certifications/cc" target="_blank">Certified in Cybersecurity (CC) </a>exam through shared learning and open discussions. During the session, <a href="https://www.linkedin.com/in/31337au/" target="_blank">Edward F.</a> and I had the privilege of facilitating conversations around key domains and question strategies, but the real value came from the group&rsquo;s engagement, curiosity, and collaborative spirit.<br />A big thank you to everyone who joined and contributed to the conversations. It&rsquo;s exciting to see how this program can continue to grow and support aspiring cybersecurity professionals in Sydney.<br /><br /><img class="imageStyle" alt="20260317-001" src="https://www.jbbres.com/files/20260317-001.png" width="1195" height="896" /><br /><br /><em>Looking for more?<br /></em><span style="font:12px AppleColorEmoji; ">▶️</span><em>  </em><em><a href="files/cc-2023.html" title="Blog:💡 Certified in CyberSecurity - Your Journey to Certification">A series of articles</a></em><em> I published back in 2023 covering all the areas of knowledge required to earn the ISC2 CC certification:</em>]]></content:encoded></item><item><title>We&#x2019;re hiring: Senior Cyber Defence and Response Specialist </title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2026-03-06T12:09:51+11:00</dc:date><link>https://www.jbbres.com/files/9e5d0719655d8d9b38903040f6e7a807-172.html#unique-entry-id-172</link><guid isPermaLink="true">https://www.jbbres.com/files/9e5d0719655d8d9b38903040f6e7a807-172.html#unique-entry-id-172</guid><content:encoded><![CDATA[<span style="font:12px AppleColorEmoji; ">📍</span><em> Sydney (Hybrid) | </em><span style="font:12px AppleColorEmoji; ">🏦</span><em> Financial Services | </em><span style="font:12px AppleColorEmoji; ">🛡️</span><em> Cyber Defence & Incident Response</em><br /><br />We&rsquo;re continuing to strengthen our Cyber Defence Centre at AMP and are recruiting a Senior Cyber Defence and Response Specialist to help protect an iconic Australian financial institution during a period of genuine transformation.<br /><br />This is a hands‑on, technical role at the heart of our cyber operations. You&rsquo;ll be detecting, investigating and responding to sophisticated threats across a complex enterprise environment, while helping us move towards a more proactive, intelligence‑led defence model. Beyond BAU response, you&rsquo;ll play a key role in improving detection, threat hunting, automation and incident response maturity across AMP.<br /><br />You&rsquo;ll be a great fit for this role if you have: <br /><ul class=""><li>Strong, hands‑on experience in incident response, threat hunting and security event analysis</li><li>Solid capability across SIEM, XDR, endpoint, WAF and cloud security controls</li><li>Experience working in large, regulated enterprise environments</li><li>Practical knowledge of frameworks such as MITRE ATT&CK, NIST and cyber kill chains</li><li>A calm, analytical approach and the ability to perform well in fast‑paced situations</li></ul><br />At AMP, we&rsquo;re intentionally lean, inclusive and outcomes‑focused. You&rsquo;ll be close to the action, encouraged to challenge the status quo, and supported by leaders who genuinely value strong security thinking. If you enjoy variety, taking ownership, and seeing your work directly improve organisational resilience, you&rsquo;ll feel at home here.<br /><br />If you&rsquo;re keen to protect what matters today and help shape how cyber defence is done tomorrow, we&rsquo;d love to hear from you.<br /><br /><span style="font:12px AppleColorEmoji; ">➡️ </span>Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/4048/?utm_medium=jobshare&utm_source=External+Job+Share" target="_blank">Senior Cyber Defence and Response Specialist</a>]]></content:encoded></item><item><title>Geopolitics Is Now a Technology Risk</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Articles</category><dc:date>2026-02-25T09:51:29+11:00</dc:date><link>https://www.jbbres.com/files/dd832204b3a67ec9812790aac8caad19-170.html#unique-entry-id-170</link><guid isPermaLink="true">https://www.jbbres.com/files/dd832204b3a67ec9812790aac8caad19-170.html#unique-entry-id-170</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><br />Geopolitics has become a direct and material <strong>technology</strong> risk, and it now firmly belongs on the CISO&rsquo;s agenda. 🌐 Trade disputes, sanctions, cyber espionage, and digital sovereignty are reshaping where data lives, who can access it, and how resilient our platforms really are. <br /><br />Our dependence on globally distributed supply chains and a small number of predominantly US-based <span style="font:12px AppleColorEmoji; ">☁️</span> cloud providers has concentrated high‑value data and critical services in a few strategic locations. In a heightened geopolitical environment, cloud data centres are now strategic infrastructure, and disruptions&mdash;malicious or not&mdash;can quickly become systemic business events. <br /><br />In this article, I explore why technology is uniquely exposed to geopolitical shocks and what CISOs and technology leaders should be doing now to factor geopolitics into cloud, availability, and resilience planning. <br /><br /></p>]]></content:encoded></item><item><title>Cybersecurity Study Group: (ISC)&#xb2; Certified in Cybersecurity (CC) </title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><category>Certified in Cybersecurity</category><dc:date>2026-02-20T17:35:46+11:00</dc:date><link>https://www.jbbres.com/files/87da04c1be57386db444ac92542d389c-171.html#unique-entry-id-171</link><guid isPermaLink="true">https://www.jbbres.com/files/87da04c1be57386db444ac92542d389c-171.html#unique-entry-id-171</guid><content:encoded><![CDATA[Looking forward to our pilot <strong>Cybersecurity Study Group</strong> session with <a href="https://www.linkedin.com/in/31337au/" target="_blank">Edward F.</a>! <span style="font:12px AppleColorEmoji; ">🚀</span><br />If you&rsquo;re interested in the <strong>(ISC)&sup2; Certified in Cybersecurity (CC) </strong>certification, this is your chance to study with peers, ask questions, and learn from industry professionals.<br /><br /><iframe src="https://www.linkedin.com/embed/feed/update/urn:li:share:7430480923571433474" height="1283" width="504" frameborder="0" allowfullscreen="" title="Embedded post"></iframe>]]></content:encoded></item><item><title>We&#x2019;re hiring: Senior Security Architect</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2026-02-14T10:13:18+11:00</dc:date><link>https://www.jbbres.com/files/83df2689b5726bf8d9498818fc9a4969-169.html#unique-entry-id-169</link><guid isPermaLink="true">https://www.jbbres.com/files/83df2689b5726bf8d9498818fc9a4969-169.html#unique-entry-id-169</guid><content:encoded><![CDATA[<span style="font:12px AppleColorEmoji; ">📍</span><em> Melbourne (Hybrid) | </em><span style="font:12px AppleColorEmoji; ">🏦</span><em> Financial Services | </em><span style="font:12px AppleColorEmoji; ">🔒</span><em> Security Architecture</em><br />We&rsquo;re expanding our security team at AMP and hiring a Senior Security Architect to design and implement robust security architectures in a regulated financial environment.<br />You&rsquo;ll lead security strategy, architect secure systems, collaborate with engineering teams, and ensure compliance while protecting customer data and operations.<br /><br />You&rsquo;ll be great for this role if you have: <br /><span style="font:12px AppleColorEmoji; ">🔹</span> Proven experience in security architecture and design <br /><span style="font:12px AppleColorEmoji; ">🔹</span> Deep knowledge of cloud security, identity management, and threat modelling <br /><span style="font:12px AppleColorEmoji; ">🔹</span> Background in financial services or regulated industries <br /><span style="font:12px AppleColorEmoji; ">🔹</span> Strong communication skills to influence stakeholders<br /><br />Join us to shape secure financial services innovation and advance your cybersecurity career.<br /><br /><span style="font:12px AppleColorEmoji; ">➡️ </span>Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/4010/?utm_medium=jobshare&utm_source=External+Job+Share" target="_blank">Senior Security Architect</a>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; You Can&#x2019;t Secure What You Can&#x2019;t See: The Case for SBOMs</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Articles</category><dc:date>2026-02-02T19:09:16+11:00</dc:date><link>https://www.jbbres.com/files/7f526c2c8744b5002c3cbe987831f71d-168.html#unique-entry-id-168</link><guid isPermaLink="true">https://www.jbbres.com/files/7f526c2c8744b5002c3cbe987831f71d-168.html#unique-entry-id-168</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><br />Modern software is assembled from countless third‑party and open‑source components. And if you can&rsquo;t see them, you can&rsquo;t secure them. <span style="font:12px AppleColorEmoji; ">🔎🔐</span><br /><br />This article explains why SBOMs (Software Bills of Materials) are becoming essential for managing supply‑chain risk, strengthening incident response, and meeting rising security and compliance expectations.<br /><br />If you want faster visibility, better control, and fewer surprises in your software stack, this one&rsquo;s for you.</p>]]></content:encoded></item><item><title>We&#x2019;re hiring: Security Services Senior Specialist (AppSec)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2026-01-28T13:10:54+11:00</dc:date><link>https://www.jbbres.com/files/8c283a3013296d971e45f7c1502cbac5-167.html#unique-entry-id-167</link><guid isPermaLink="true">https://www.jbbres.com/files/8c283a3013296d971e45f7c1502cbac5-167.html#unique-entry-id-167</guid><content:encoded><![CDATA[<span style="font:12px AppleColorEmoji; ">📍</span><em> Sydney (Hybrid) | </em><span style="font:12px AppleColorEmoji; ">🏦</span><em> Financial Services | </em><span style="font:12px AppleColorEmoji; ">🔐</span><em> Application & Vulnerability Security</em><br />We&rsquo;re expanding our security team at AMP and hiring a Security Services Senior Specialist to lead application security, penetration testing, and vulnerability management.<br />You&rsquo;ll own and uplift our AppSec framework, pen‑testing program, and vulnerability lifecycle, shaping engineering practices and protecting millions of customers.<br /><br />You&rsquo;ll be great for this role if you have:<br /><span style="font:12px AppleColorEmoji; ">🔹 </span>Strong AppSec, pen testing, and vuln‑management experience<br /><span style="font:12px AppleColorEmoji; ">🔹 </span>Confidence owning services and improving processes<br /><span style="font:12px AppleColorEmoji; ">🔹 </span>Experience in regulated environments<br /><span style="font:12px AppleColorEmoji; ">🔹 </span>Ability to turn technical risks into clear guidance<br /><br />Join us to make a real impact on the future of financial services while growing your career.<br /><br /><span style="font:12px AppleColorEmoji; ">➡️ </span>Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/3966?utm_medium=jobboard&utm_source=linkedin" target="_blank">Security Service Senior Specialist</a>]]></content:encoded></item><item><title>We&#x2019;re hiring: 2x Enterprise Security Architects</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2026-01-08T10:10:37+11:00</dc:date><link>https://www.jbbres.com/files/ee68a467e0b2ad2de6fbbfe726eea97d-166.html#unique-entry-id-166</link><guid isPermaLink="true">https://www.jbbres.com/files/ee68a467e0b2ad2de6fbbfe726eea97d-166.html#unique-entry-id-166</guid><content:encoded><![CDATA[<span style="font:12px AppleColorEmoji; ">📍</span><em> Sydney (Hybrid) | </em><span style="font:12px AppleColorEmoji; ">🏦</span><em> Financial Services | </em><span style="font:12px AppleColorEmoji; ">🔐</span><em> Enterprise-scale security</em><br />We&rsquo;re expanding our security leadership capability and are recruiting two Enterprise Security Architects to help shape and protect a complex, customer‑centric financial services environment.<br />If you&rsquo;re passionate about designing security that enables the business, working at enterprise scale, and influencing outcomes across cloud, data, and core platforms, this could be a great next step. <br /><br /><span style="font:12px AppleColorEmoji; ">➡️ </span>Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/3948?utm_medium=jobboard&utm_source=linkedin" target="_blank">Entreprise Security Architect</a>]]></content:encoded></item><item><title>&#xd83d;&#xdca1;Agentic AI&#x27;s Identity Crisis</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2026-01-06T13:45:48+11:00</dc:date><link>https://www.jbbres.com/files/01d2bb8bbbbb615da16b715a656d29b6-164.html#unique-entry-id-164</link><guid isPermaLink="true">https://www.jbbres.com/files/01d2bb8bbbbb615da16b715a656d29b6-164.html#unique-entry-id-164</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><strong>Agentic AI </strong>&mdash; autonomous <span style="font:12px AppleColorEmoji; ">🤖</span> agents that can perceive, decide, and act &mdash; are entering business workflows fast. But as these non-human &ldquo;digital workers&rdquo; multiply, <span style="font:12px AppleColorEmoji; ">🫆</span> <strong>identity</strong> has become the hidden challenge.<br /><br />Most enterprises haven&rsquo;t extended authentication and access controls to these agents, creating ungoverned digital personas operating at machine speed: a serious security risk.<br /><br />This article explores why identity is the <strong>new frontier of AI security,</strong> and how cybersecurity leaders can govern agentic AI safely through strong authentication, lifecycle management, and accountability.</p>]]></content:encoded></item><item><title>Australian School Cyber Challenge 2026</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2025-12-06T11:30:40+11:00</dc:date><link>https://www.jbbres.com/files/b2ff0dc98b6ba21b79d7a00866fa8163-163.html#unique-entry-id-163</link><guid isPermaLink="true">https://www.jbbres.com/files/b2ff0dc98b6ba21b79d7a00866fa8163-163.html#unique-entry-id-163</guid><content:encoded><![CDATA[I am proud to share that <strong><a href="https//www.amp.com.au" target="_blank">AMP</a></strong> will be a sponsor of the <strong><a href="https://cyberpathways.com.au/ascc/" target="_blank">Australian Schools Cyber Challenge 2026</a></strong>! <br /><br /><span style="font:12px AppleColorEmoji; ">🧑&zwj;🎓</span> Thousands of students and schools will be shaping the future of Australia&rsquo;s cybersecurity talent. ASCC 2026 brings together students from every state and territory, building a sense of competition, community, and pride.<br /><br />Students step out of the classroom and onto a national stage where creativity, curiosity and critical thinking shine. Schools benefit from increased visibility, community engagement, and recognition for their support of future-ready education.<br /><br />If your school wants to be part of something meaningful and future-focused, this is it.<br /><br />At AMP, supporting programs that nurture innovation, education, and technology skills is something we deeply believe in, and the Cyber Challenge is a perfect example of that mission in action.  <br /><br />Looking forward to seeing the creativity, curiosity, and determination of all the participating students this year!  <br /><br />Find out more at <a href="https://cyberpathways.com.au/ascc/" target="_blank">https://cyberpathways.com.au/ascc/</a><br />]]></content:encoded></item><item><title>Looking for a Cyber Engineering Specialist</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2025-11-07T09:31:08+11:00</dc:date><link>https://www.jbbres.com/files/7d5e40bafd204848e817ea5ad9900ba0-162.html#unique-entry-id-162</link><guid isPermaLink="true">https://www.jbbres.com/files/7d5e40bafd204848e817ea5ad9900ba0-162.html#unique-entry-id-162</guid><content:encoded><![CDATA[We&rsquo;re growing our <span style="font:12px AppleColorEmoji; ">🛡️</span>Cyber team at <strong>AMP</strong>!<br /> If you're passionate about building secure systems that enable innovation, we&rsquo;d love to hear from you.<br />Our Security, Risk & Compliance team is deeply embedded in the organisation - driving strategy, enabling transformation, and protecting what matters. We work with purpose, backed by strong leadership and a clear mandate.<br />We&rsquo;re hiring a <span style="font:12px AppleColorEmoji; ">🧑&zwj;💻</span> <strong>Cyber Engineering Specialist</strong> to join us in Sydney.<br /><br /><span style="font:12px AppleColorEmoji; ">➡️</span> Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/3837" target="_blank">Cyber Engineering Specialist</a>]]></content:encoded></item><item><title>Cyber Security Awareness Month 2025</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2025-10-31T20:20:55+11:00</dc:date><link>https://www.jbbres.com/files/df3e301fb674580b79362cdc6abf70ad-161.html#unique-entry-id-161</link><guid isPermaLink="true">https://www.jbbres.com/files/df3e301fb674580b79362cdc6abf70ad-161.html#unique-entry-id-161</guid><content:encoded><![CDATA[This week at <strong><a href="https://www.amp.com.au" target="_blank">AMP</a></strong>, we wrapped up our <strong>Cyber Security Awareness Month</strong> with our annual Cyber Security Showcase!<br /><br />The event was buzzing with energy: interactive challenges, live demos, and conversations that turned complex topics into practical, actionable insights.]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Quantum Computing and the Future of Encryption</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2025-10-13T22:26:32+11:00</dc:date><link>https://www.jbbres.com/files/2c5b8e339d0049a6896eda78d83f5d0b-159.html#unique-entry-id-159</link><guid isPermaLink="true">https://www.jbbres.com/files/2c5b8e339d0049a6896eda78d83f5d0b-159.html#unique-entry-id-159</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">Quantum computing promises breakthroughs in science, medicine, and technology &mdash; but it also poses one of the biggest challenges yet to our digital security.<br />This article explores why organisations should be preparing now for a post-quantum world &mdash; not out of panic, but prudence. <br />Because when the flood comes, you don&rsquo;t want to be halfway across the bridge.<br /><ul class="disc"><li><span style="font:12px AppleColorEmoji; ">🔒 </span><em>What happens when quantum computers can break today&rsquo;s encryption?</em></li><li><span style="font:12px AppleColorEmoji; ">🧭 </span><em>Why &ldquo;harvest now, decrypt later&rdquo; makes this a present-day risk?</em></li><li><span style="font:12px AppleColorEmoji; ">🛠️</span><em> And how can organisations start planning for the transition?</em></li></ul></p>]]></content:encoded></item><item><title>Cyber Awareness Month 2025</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2025-10-10T18:57:02+11:00</dc:date><link>https://www.jbbres.com/files/a8ccf41e13d05acb959606c3caaa636d-160.html#unique-entry-id-160</link><guid isPermaLink="true">https://www.jbbres.com/files/a8ccf41e13d05acb959606c3caaa636d-160.html#unique-entry-id-160</guid><content:encoded><![CDATA[Today, as part of <a href="https://www.cyber.gov.au/cam2025" target="_blank">Cyber Awareness Month</a>, our Information Security team conducted a webinar for our <a href="https://www.amp.com.au" target="_blank">AMP</a> colleagues, sharing valuable insights on implementing online security practices effectively.<br /><br />During the session, we covered a wide range of tips applicable to both work and home environments. From utilising auto-updates for all devices, (including robot vacuums!), to segmenting home Wi-Fi networks. We emphasised the importance of proactive security measures in the era of AI. Particularly, we discussed safeguarding children and older family members online.<br /><br />We wrapped up by asking: &ldquo;What&rsquo;s one thing you&rsquo;d recommend to others to stay secure?&rdquo; Here are some key takeaways from the discussion:<br /><ul class="disc"><li><span style="font:12px AppleColorEmoji; ">✨ </span>Enhance security by <strong>enabling Multi-Factor Authentication (MFA) </strong>and transitioning to passwordless solutions.</li><li><span style="font:12px AppleColorEmoji; ">🔑 </span>Simplify <strong>password management </strong>with tools like 1Password, Microsoft Wallet, Google Password Manager and iCloud Passwords to handle complex and unique passwords effortlessly.</li><li><span style="font:12px AppleColorEmoji; ">🔍 </span>Stay vigilant by <strong>checking for data breaches </strong>using Have I Been Pwned and promptly updating compromised passwords.</li><li><span style="font:12px AppleColorEmoji; ">🤔 </span>Exercise <strong>caution before clicking on links</strong> and maintain awareness of your online activities to protect your digital footprint.</li></ul><br />It's truly commendable to witness our AMP team's commitment to cybersecurity awareness and proactive measures.<br /><br />Thanks <a href="https://www.linkedin.com/in/kathy-grosse-9b82b48b/" target="_blank">Kathy Grosse</a>, <a href="https://www.linkedin.com/in/dalupton/" target="_blank">Daniel Lupton</a>, <a href="https://www.linkedin.com/in/vineetpulikottil/" target="_blank">Vineet Ppulikottil</a>, <a href="https://www.linkedin.com/in/max-phongsack-a86073103/" target="_blank">Max Phongsack</a>, <a href="https://www.linkedin.com/in/steveespino/" target="_blank">Steve Espino</a> and <a href="https://www.linkedin.com/in/daisy-cp-clarke/" target="_blank">Daisy Clarke</a>.<br /><br /><img class="imageStyle" alt="A laptop screen showing a virtual meeting with six animated characters, promoting cybersecurity awareness. The screen displays messages such as ‘Switch On Your Security This Awareness Month,’ ‘Use a unique and strong password for every account,’ and ‘Switch on automatic software updates.’ The setting is a warm, home office environment." src="https://www.jbbres.com/files/20251010-001.png" width="1024" height="683" />]]></content:encoded></item><item><title>David Gee&#x27;s new book</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><category>Good Reads</category><dc:date>2025-10-06T15:11:24+11:00</dc:date><link>https://www.jbbres.com/files/6b721e250cad8adf37969523f6dd565b-155.html#unique-entry-id-155</link><guid isPermaLink="true">https://www.jbbres.com/files/6b721e250cad8adf37969523f6dd565b-155.html#unique-entry-id-155</guid><content:encoded><![CDATA[Congratulations to <a href="https://www.linkedin.com/in/davidjordangee" target="_blank">David Gee</a> on his new book! <br /><code><iframe src="https://www.linkedin.com/embed/feed/update/urn:li:share:7379737008577064961?collapsed=1" height="658" width="504" frameborder="0" allowfullscreen="" title="Embedded post"></iframe></code>]]></content:encoded></item><item><title>&#x201c;Your Bank is Calling&#x201d; - AMP Bank GO adds Caller-Verification to Fight Scams</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><dc:date>2025-09-02T16:31:40+10:00</dc:date><link>https://www.jbbres.com/files/2e9c245ea84a7f8898d0e98955893e44-154.html#unique-entry-id-154</link><guid isPermaLink="true">https://www.jbbres.com/files/2e9c245ea84a7f8898d0e98955893e44-154.html#unique-entry-id-154</guid><content:encoded><![CDATA[<img class="imageStyle" alt="20250831001" src="https://www.jbbres.com/files/20250831001.jpg" width="1850" height="1024" /> <br /><br />If you&rsquo;ve ever hesitated to pick up a call that might be from your bank, especially amid soaring rates of phone-based scams, you&rsquo;re not alone. <br />I&rsquo;m very proud of the great work we&rsquo;re doing at AMP to protect our customers, and with our latest <a href="https://www.amp.com.au/personal-banking" target="_blank">AMP Bank GO</a> app feature, &ldquo;<strong>Your Bank is Calling</strong>,&rdquo; we have your back even more. It&rsquo;s a smart heads-up in real time, showing up during a call to affirm whether the person on the other end is really from your bank or not.<br /><br />No more guessing. Instead, the AMP Bank GO app displays messages like &ldquo;<em>You&rsquo;re on a call with AMP Bank GO</em>&rdquo; or &ldquo;<em>We&rsquo;ve never called you</em>.&rdquo; This reassurance is delivered in the moment, not hours later when regret sets in.<br /><br />Scammers have turned impersonation into an art form. In recent years, Australians lost billions to scams, on average nearly $20,000 per person, because the fakes appear too real. And when a caller sounds like the bank, fear sometimes overrides common sense.<br /><br />But now, imagine being mid-conversation, and your banking app itself says that you&rsquo;re on a safe call. That kind of compute-powered nudge to trust (or distrust) isn&rsquo;t just technology; it&rsquo;s a lifeline.<br /><br />Combined with previous security steps we&rsquo;ve been introducing, such as numberless debit cards that drastically reduce card fraud and a photo-ID plus selfie video check that&rsquo;s already flagged over 1,000 shady accounts during onboarding, this is another purposeful layer of friction.<br /><br />Small steps, big peace of mind.]]></content:encoded></item><item><title>Journey to Scrum</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2025-07-15T09:56:42+10:00</dc:date><link>https://www.jbbres.com/files/3417293926291551ed632abbb5aaa69c-153.html#unique-entry-id-153</link><guid isPermaLink="true">https://www.jbbres.com/files/3417293926291551ed632abbb5aaa69c-153.html#unique-entry-id-153</guid><content:encoded><![CDATA[<img class="imageStyle" alt="20250715001" src="https://www.jbbres.com/files/20250715001.png" width="768" height="512" /><br /><br />The <a href="https://www.amp.com.au" target="_blank">AMP Security, Risk & Compliance Team</a> is on a journey to become more agile, emphasising delivering value over getting bogged down by processes and bureaucracy. This week, I had the opportunity to join several colleagues in an intensive two-day Scrum training&hellip; and I&rsquo;m thrilled to share that I&rsquo;m now a <a href="https://bcert.me/scajcjukl" target="_blank">Certified Scrum Master!</a> <br /><br />The training was insightful, shedding light on the importance of breaking down silos and fostering cross-functional collaboration. Scrum encourages us to think outside the box, adapt quickly, and continuously improve, which aligns perfectly with our mission to drive meaningful outcomes.<br /><br />A heartfelt thank you to our trainer, <a href="https://www.linkedin.com/in/sam-bowtell-cst-b92a56/" target="_blank">Sam B. From Grow Your Agility</a>, whose expertise and engaging approach made the learning experience both impactful and inspiring.<br /><br />Looking forward to applying these principles as we continue to evolve and deliver greater value as a team. ]]></content:encoded></item><item><title>ISACA Sydney Chapter June Forum</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><dc:date>2025-06-20T15:41:47+10:00</dc:date><link>https://www.jbbres.com/files/7db29ce19737327f29e08df2cc776dde-152.html#unique-entry-id-152</link><guid isPermaLink="true">https://www.jbbres.com/files/7db29ce19737327f29e08df2cc776dde-152.html#unique-entry-id-152</guid><content:encoded><![CDATA[Yesterday, I had the privilege of attending the June <a href="https://engage.isaca.org/sydney/home" target="_blank">ISACA Sydney Chapter</a> Forum, where <a href="https://www.linkedin.com/in/maryamshoraka/" target="_blank">Maryam Shoraka</a> presented on "Build It Like a Brain: Neuroscience-Inspired Approaches to SOC Architecture." Maryam's insights were truly captivating, offering a fresh perspective on security monitoring and response that could revolutionise the field. <br /><br />A big thank you to the ISACA Team and AMP Security and Risk Teams for their dedication in making this event a success!<br /><br /><img class="imageStyle" alt="20250620001" src="https://www.jbbres.com/files/20250620-001.jpg" width="768" height="512" /><br /><img class="imageStyle" alt="20250620002" src="https://www.jbbres.com/files/20250620-002.png" width="768" height="512" />]]></content:encoded></item><item><title>Looking for a Senior Cloud Security Architect</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2025-05-31T11:09:48+10:00</dc:date><link>https://www.jbbres.com/files/187750534a2b5a5d392e6939ba6e8f2e-150.html#unique-entry-id-150</link><guid isPermaLink="true">https://www.jbbres.com/files/187750534a2b5a5d392e6939ba6e8f2e-150.html#unique-entry-id-150</guid><content:encoded><![CDATA[AMP is transforming&mdash;embracing fresh leadership, new thinking, and a future-focused approach. We&rsquo;re looking for a <strong>Senior Cloud Security Architect</strong> to help redefine what financial services can be while ensuring our digital security remains world-class. In this role, you will lead our Secure By Design process, influence security decisions and help drive innovation while managing risk<br />At AMP, our purpose is simple: helping people create their tomorrow. <br />If you thrive in regulated environments, have deep AWS security expertise, and bring passion for information security, we want you on our team.<br /><br /><span style="font:12px AppleColorEmoji; ">➡️</span> Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/3455/?utm_medium=jobshare&utm_source=External+Job+Share" target="_blank">Senior Security Architect</a><br />]]></content:encoded></item><item><title>Looking for a Security Service Senior Specialist (AppSec &#x26; Pen Test)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2025-05-26T14:17:30+10:00</dc:date><link>https://www.jbbres.com/files/62e4502ad6ac78b1ae941b014edbceca-149.html#unique-entry-id-149</link><guid isPermaLink="true">https://www.jbbres.com/files/62e4502ad6ac78b1ae941b014edbceca-149.html#unique-entry-id-149</guid><content:encoded><![CDATA[We are looking for a new team member to join our fantastic Security Service team! This role will primarily involve overseeing Application Security, Penetration Testing, and Vulnerabilities Management services for AMP. The position entails close collaboration with our Technology, Risk, and other Security teams to ensure comprehensive security measures. Join us in safeguarding AMP!<br /><br /><span style="font:12px AppleColorEmoji; ">➡️</span> Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/3457/?utm_medium=jobshare&utm_source=External+Job+Share" target="_blank">Security Service Senior Specialist (AppSec & Pen Test)</a>]]></content:encoded></item><item><title>ISC2 Sydney Chapter Inaugural Meeting</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Security</category><category>Certified in Cybersecurity</category><category>Conferences</category><dc:date>2025-05-21T18:56:25+10:00</dc:date><link>https://www.jbbres.com/files/ac39b5d13ab826ba5da7f26d6ec426d9-148.html#unique-entry-id-148</link><guid isPermaLink="true">https://www.jbbres.com/files/ac39b5d13ab826ba5da7f26d6ec426d9-148.html#unique-entry-id-148</guid><content:encoded><![CDATA[It was an absolute honour to be part of yesterday&rsquo;s inaugural <strong><a href="https://www.linkedin.com/company/isc2sydneychapter/posts/?feedView=all" target="_blank">ISC2 Sydney Chapter</a></strong> event and to join the panel discussion on AI and its impact on careers in Cybersecurity. The energy in the room, the insightful conversations, and the passion for building a strong local cybersecurity community were truly inspiring.<br />A big thank you to the ISC2 Sydney Chapter team for the warm welcome <a href="https://www.linkedin.com/in/31337au/" target="_blank">Edward Farrell</a>, <a href="https://www.linkedin.com/in/mark-lee-6534a017/" target="_blank">Mark Lee</a>, <a href="https://www.linkedin.com/in/jcozzupoliciso/" target="_blank">Joe Cozzupoli</a>, <a href="https://www.linkedin.com/in/steveespino/" target="_blank">Steve Espino</a> and <a href="https://www.linkedin.com/in/elaine-h-03181a35/" target="_blank">Elaine H.</a> and for putting together such a fantastic event. <br />Grateful to have shared the stage with such knowledgeable and forward-thinking panelists <a href="https://www.linkedin.com/in/reneessomba/" target="_blank">Ren&eacute; Essomba,</a> <a href="https://www.linkedin.com/in/codykieltyka/" target="_blank">Cody Kieltyka</a> and <a href="https://www.linkedin.com/in/gauravvikash/" target="_blank">Gaurav Vikash</a> &mdash; your perspectives made the discussion both engaging and thought-provoking.<br />Looking forward to seeing how this community grows and contributes to the future of cybersecurity in Sydney and beyond.<br /><br /><img class="imageStyle" alt="20250521001" src="https://www.jbbres.com/files/20250521001.jpg" width="768" height="512" />]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Cyber Risk Monitoring</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2025-05-07T09:44:56+10:00</dc:date><link>https://www.jbbres.com/files/055001d5ac7702f912f3b7d274d26fed-147.html#unique-entry-id-147</link><guid isPermaLink="true">https://www.jbbres.com/files/055001d5ac7702f912f3b7d274d26fed-147.html#unique-entry-id-147</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">Cyber risk monitoring isn&rsquo;t just a technical task&mdash;it&rsquo;s the backbone of staying resilient in a fast-changing digital landscape. From protecting critical assets to navigating strict security frameworks like NIST or ISO/IEC 27001, it&rsquo;s about building a shield that adapts as threats evolve.<br />Discover how tailored strategies, real-time insights, and cutting-edge tools like AI and big data analytics are redefining risk management. Learn why collaboration, workforce upskilling, and flexible frameworks are the keys to thriving in this era of complex challenges.</p>]]></content:encoded></item><item><title>CGEIT Certification</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2024-11-09T20:27:46+11:00</dc:date><link>https://www.jbbres.com/files/4236daa43539df48f148a376d070fabb-146.html#unique-entry-id-146</link><guid isPermaLink="true">https://www.jbbres.com/files/4236daa43539df48f148a376d070fabb-146.html#unique-entry-id-146</guid><content:encoded><![CDATA[I'm thrilled to share that I have officially received my <a href="https://www.credly.com/badges/f27d67db-44dc-41e8-8710-063188d9177f/public_url" target="_blank">Certification in the Governance of Enterprise IT (CGEIT)</a> ! <span style="font:12px AppleColorEmoji; ">👨&zwj;🎓<br /></span><span style="font:12px AppleColorEmoji; "><br /></span><p style="text-align:center;"><a href="https://www.credly.com/badges/f27d67db-44dc-41e8-8710-063188d9177f/public_url" target="_blank"><img class="imageStyle" alt="certified-in-the-governance-of-enterprise-it-cgeit" src="https://www.jbbres.com/files/certified-in-the-governance-of-enterprise-it-cgeit.png" width="88" height="88" /></a></p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Risk Management in Technology</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2024-07-02T10:16:06+10:00</dc:date><link>https://www.jbbres.com/files/dcfe90f84eada6bbf6923c3795bdff3d-145.html#unique-entry-id-145</link><guid isPermaLink="true">https://www.jbbres.com/files/dcfe90f84eada6bbf6923c3795bdff3d-145.html#unique-entry-id-145</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">Learn about the importance of risk management in technology, particularly in mitigating cybersecurity threats, preventing system outages, and building trust with stakeholders. <br />This article covers the risk management process, including risk identification, assessment, treatment, and monitoring, as well as the significance of controls in information security. <br />Additionally, it introduces the concept of a quantitative risk model for assessing and managing risks using numerical data and metrics to enhance control effectiveness and resilience against cybersecurity threats.</p>]]></content:encoded></item><item><title>Looking for a Security Services Senior Specialist</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2024-05-04T11:51:48+10:00</dc:date><link>https://www.jbbres.com/files/eab3fa74398e0ab5ef7baa2957c3dc85-144.html#unique-entry-id-144</link><guid isPermaLink="true">https://www.jbbres.com/files/eab3fa74398e0ab5ef7baa2957c3dc85-144.html#unique-entry-id-144</guid><content:encoded><![CDATA[We are looking for a <strong>Security Services Senior Specialist</strong>! - AMP is undergoing a transformative security uplift, and we're seeking exceptional talent to fortify our cyber defenses. <br />In this pivotal role, you'll transition us from a reactive to a preemptive security posture, safeguarding against ever-escalating threats.<br /><br />If you're passionate about cybersecurity and want to make a lasting impact, apply now!<br /><br /><span style="font:12px AppleColorEmoji; ">➡️</span> Apply now: <a href="https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/2607/?utm_medium=jobshare" target="_blank">Security Services Senior Specialist</a>]]></content:encoded></item><item><title>New role</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2024-02-10T14:12:01+11:00</dc:date><link>https://www.jbbres.com/files/ca1d1a56e73d9e5c6d708381e3c0dad1-142.html#unique-entry-id-142</link><guid isPermaLink="true">https://www.jbbres.com/files/ca1d1a56e73d9e5c6d708381e3c0dad1-142.html#unique-entry-id-142</guid><content:encoded><![CDATA[<span style="font:12px AppleColorEmoji; ">🎉 </span>Exciting news! I am thrilled to announce that I am joining <a href="https://www.amp.com.au" rel="external">AMP</a> as their new Director of Technology - Security, Risk & Compliance (CISO). Looking forward to embarking on this new journey.]]></content:encoded></item><item><title>Looking for new CISO @ HSBC</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2023-11-15T10:56:17+11:00</dc:date><link>https://www.jbbres.com/files/2e51a9de284b76397d8fa4814385a5e1-143.html#unique-entry-id-143</link><guid isPermaLink="true">https://www.jbbres.com/files/2e51a9de284b76397d8fa4814385a5e1-143.html#unique-entry-id-143</guid><content:encoded><![CDATA[We are on a look out for a great new <span style="font:12px AppleColorEmoji; ">🔐</span> CISO in HSBC Australia. Lead a fantastical team and join a great organisation!<br />Plus you get to fix all the crazy ideas I had over the last 3 years! <span style="font:12px AppleColorEmoji; ">😁</span> No chance to get bored <span style="font:12px AppleColorEmoji; ">😄</span><br /><strong><a href="https://www.linkedin.com/jobs/view/3747389856/?refId=%2FMKVqfOpSi6bwuUvvWRaVg%3D%3D&trackingId=%2FMKVqfOpSi6bwuUvvWRaVg%3D%3D&lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BkU9z7gbJSzSpL%2BM1IOEHCA%3D%3D&lici=%2FMKVqfOpSi6bwuUvvWRaVg%3D%3D" rel="external">Apply now</a></strong><strong> </strong>and feel free to reach out if you have questions.]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Security Operations</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><dc:date>2023-10-23T09:25:29+11:00</dc:date><link>https://www.jbbres.com/files/03655b69c02c42424a5dd6b019ede0e6-139.html#unique-entry-id-139</link><guid isPermaLink="true">https://www.jbbres.com/files/03655b69c02c42424a5dd6b019ede0e6-139.html#unique-entry-id-139</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><br /><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 6 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Security Operations</strong><br />Learn key elements of data security, including data handling, classification, logging, encryption, system hardening, configuration management, security policies, and social engineering defence through security awareness training. </p>]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Network Security</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><dc:date>2023-10-19T09:38:31+11:00</dc:date><link>https://www.jbbres.com/files/4bf95cbdcf6e0d4b70539a45818782d3-138.html#unique-entry-id-138</link><guid isPermaLink="true">https://www.jbbres.com/files/4bf95cbdcf6e0d4b70539a45818782d3-138.html#unique-entry-id-138</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /><br /></p><p style="text-align:left;"><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 5 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Network Security</strong><br />Delves into common threats and best practices for securing computer networks. It explores the array of network threats, from malware and ransomware to insider threats, and understand how network professionals mitigate these risks. </p>]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Network Concepts</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><category>IT Infrastructure</category><dc:date>2023-10-16T09:48:11+11:00</dc:date><link>https://www.jbbres.com/files/7f5eedea67ba9f415a97aca690cfff25-137.html#unique-entry-id-137</link><guid isPermaLink="true">https://www.jbbres.com/files/7f5eedea67ba9f415a97aca690cfff25-137.html#unique-entry-id-137</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /><br /></p><p style="text-align:left;"><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 4 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Network Concepts</strong><br />Discover the intricate world of computer networks. This article covers topics such as network types, essential devices, IP addresses, DHCP, network ports, and key network terms. It also explores the OSI and TCP/IP models, showcasing their role in network communication. Furthermore, the article touches upon cloud computing, highlighting different service and deployment models. </p>]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Access Management</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><dc:date>2023-10-12T08:35:48+11:00</dc:date><link>https://www.jbbres.com/files/ec371009c83f45bc47ef44ac8e144719-136.html#unique-entry-id-136</link><guid isPermaLink="true">https://www.jbbres.com/files/ec371009c83f45bc47ef44ac8e144719-136.html#unique-entry-id-136</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /><br /></p><p style="text-align:left;"><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 3 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Access Control</strong><br />Delves into the importance of access control, covering concepts encompassing defence in depth, least privilege, segregation of duty, two-person integrity, passwords, multi-factor authentication, privileged access management, account provisioning, log management, physical access control, biometric access control, and logical access control.</p>]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Incident Response&#x2c; Business Continuity and Disaster Recovery</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><category>Business Continuity</category><dc:date>2023-10-09T09:24:58+11:00</dc:date><link>https://www.jbbres.com/files/382ef49cdc89160a6ed358998671c88a-135.html#unique-entry-id-135</link><guid isPermaLink="true">https://www.jbbres.com/files/382ef49cdc89160a6ed358998671c88a-135.html#unique-entry-id-135</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /><br /></p><p style="text-align:left;"><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 2 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Incident Response, Business Continuity and Disaster Recovery</strong><br />Explore the crucial aspects of cybersecurity incident response, business continuity, and disaster recover. We will talk about the importance of incident response plans, business impact analysis, recovery strategies, and crisis management in ensuring the resilience and continuity of organisations in the face of cyber threats and disruptive events.</p>]]></content:encoded></item><item><title>&#xd83d;&#xdd10; Key Security Principles</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><dc:date>2023-10-05T10:47:43+11:00</dc:date><link>https://www.jbbres.com/files/bf43f6a2e39916bde9a76bda5443cefc-133.html#unique-entry-id-133</link><guid isPermaLink="true">https://www.jbbres.com/files/bf43f6a2e39916bde9a76bda5443cefc-133.html#unique-entry-id-133</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><br /><span style="color:#6C6C6C;"><em>Get Certified in Cybersecurity - Part 1 of 6</em></span><br /><span style="font:12px AppleColorEmoji; ">🔐</span><strong> Key Security Principles</strong><br />Discover the essentials of safeguarding sensitive data and protecting against cyber threats. From the CIA Triad to Risk Management and Privacy, this article breaks down key principles in an accessible way.</p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Certified in CyberSecurity - Your Journey to Certification</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>Certified in Cybersecurity</category><dc:date>2023-10-02T13:17:50+11:00</dc:date><link>https://www.jbbres.com/files/cc-2023.html#unique-entry-id-132</link><guid isPermaLink="true">https://www.jbbres.com/files/cc-2023.html#unique-entry-id-132</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><span style="font:12px AppleColorEmoji; "><br /></span></p><p style="text-align:left;"><span style="font:12px AppleColorEmoji; ">🚀 </span><strong>Unlock your path to a career in cybersecurity with the ISC2 Certified in Cybersecurity (CC)! </strong><br />As part of Cyber Awareness Month 2023, I'll be sharing a series of articles throughout October covering the all the knowledge needed to prepare for the ISC2 Certified in Cybersecurity (CC). <br />Ideal for IT professionals, career changers, executives, and recent grads, this entry-level certification offers free exam and online training for a limited time, making it more accessible than ever.<br />Find out more about the ISC2 CC Certification. Your cybersecurity journey starts here! </p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Ensuring CyberSecurity in Vendor Management</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2023-07-09T15:31:10+10:00</dc:date><link>https://www.jbbres.com/files/06701b5fe797d2fc76198e80a838b1b0-131.html#unique-entry-id-131</link><guid isPermaLink="true">https://www.jbbres.com/files/06701b5fe797d2fc76198e80a838b1b0-131.html#unique-entry-id-131</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">As our interconnected world amplifies cyber risks in the supply chain, the indispensable role of vendor managers in protecting valuable assets cannot be overlooked. With their unique insights and strategic position, they are instrumental in identifying and mitigating potential vulnerabilities.<br /><br />This article provides vendor managers with invaluable guidance on elevating their role in safeguarding the supply chain. From selecting secure vendors to establishing robust contractual agreements, they will find actionable steps to fortify their organisation's cybersecurity posture. </p>]]></content:encoded></item><item><title>Adapt Security Edge 2023</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><dc:date>2023-05-01T13:10:46+10:00</dc:date><link>https://www.jbbres.com/files/95843745f279e7225f25b73bc0af8cdb-130.html#unique-entry-id-130</link><guid isPermaLink="true">https://www.jbbres.com/files/95843745f279e7225f25b73bc0af8cdb-130.html#unique-entry-id-130</guid><content:encoded><![CDATA[I had an amazing time participating in the Adapt Security Edge conference last Thursday! <br />It was an incredible experience to be part of the panel discussion on "Latest Strategies from the Security Front Line," and share with <a href="https://www.linkedin.com/in/peter-hind-4417b5/" rel="external">Peter Hind</a>, <a href="https://www.linkedin.com/in/bwirth/" rel="external">Bianca Wirth</a> and <a href="https://www.linkedin.com/in/francisofungwu/" rel="external">Francis Ofungwu</a> on Zero Trust, AI and more. <br /><br /><img class="imageStyle" alt="TPA07335" src="https://www.jbbres.com/files/tpa07335.jpg" width="1124" height="749" />]]></content:encoded></item><item><title>NSA&#x27;s Best Practices for Security your Home Network</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2023-03-02T15:23:39+11:00</dc:date><link>https://www.jbbres.com/files/450d82fdcb3a1719ca1970d513049d70-129.html#unique-entry-id-129</link><guid isPermaLink="true">https://www.jbbres.com/files/450d82fdcb3a1719ca1970d513049d70-129.html#unique-entry-id-129</guid><content:encoded><![CDATA[In a <a href="https://www.theverge.com/2023/2/28/23618353/lastpass-security-breach-disclosure-password-vault-encryption-update" rel="external">very recent piece of news</a>, it was revealed that LastPass, a wildly used password manager, fail victim to a cyber attack and got all their customer data (i.e. the users stored passwords) stolen in the form of an encrypted database. Because the database was encrypted, the hackers could not access the content, so they proceed by attacking the personal home devices of one of the only 4 employees that had access to database password, and managed to break into his network and stole that password, getting access to all customer data.<br />That is a very committed hacker, but sadly, that is the reality: we are now all targets at home, because it is often easier to break into someone personal device and use it as a leverage to attack their organisation they work for.<br /><br />Just as timely as this news is the recent publication by the NSA of their <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3304674/nsa-releases-best-practices-for-securing-your-home-network/" rel="external">Best Practices for Security your Home Network</a>. These are great recommendations that we can only recommend everyone to have a look at and, when possible, implement at your home!]]></content:encoded></item><item><title>&#xd83d;&#xdca1; ChatGPT and the future of CyberSecurity</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2023-02-21T10:40:53+11:00</dc:date><link>https://www.jbbres.com/files/c0c37575628b63804174a78c14d636ce-128.html#unique-entry-id-128</link><guid isPermaLink="true">https://www.jbbres.com/files/c0c37575628b63804174a78c14d636ce-128.html#unique-entry-id-128</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /><br /></p><p style="text-align:left;">If you have been using ChatGPT, you probably feel now that nothing will never be the same. It is the same feeling you had when you used the internet for the first time, when you touched your first iPhone. There will be a before and an after Artificial Intelligence, and the tipping point is now.<br /><br />It is hard to predict what a world supported by AI will look like. Some think it will be a scary place, some see a lot of exciting opportunities. But regardless what your views are, there is no denying that the cybersecurity industry will be - and already is - particularly affected. Tools like ChatGPT are a new set of capabilities, with both new opportunities and new challenges for security professionals. </p>]]></content:encoded></item><item><title>New certification: Certified Information System Security Professional (CISSP)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2023-01-28T07:30:40+11:00</dc:date><link>https://www.jbbres.com/files/ab7d5dd25cb8572d4ca990f6e0dc821b-127.html#unique-entry-id-127</link><guid isPermaLink="true">https://www.jbbres.com/files/ab7d5dd25cb8572d4ca990f6e0dc821b-127.html#unique-entry-id-127</guid><content:encoded><![CDATA[I&rsquo;m happy to share that I&rsquo;ve obtained a new certification: Certified Information System Security Professional (CISSP) from (ISC)&sup2;!<br /><br /><p style="text-align:center;"><div data-iframe-width="150" data-iframe-height="270" data-share-badge-id="98a2be0b-0521-41a4-abd1-3a6841d4ad5c" data-share-badge-host="https://www.credly.com"></div><script type="text/javascript" async src="//cdn.credly.com/assets/utilities/embed.js"></script></p>]]></content:encoded></item><item><title>New certification: Certified in Cybersecurity (CC)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2022-12-05T18:55:57+11:00</dc:date><link>https://www.jbbres.com/files/773322fe79f34baf16bf0215fb99b139-126.html#unique-entry-id-126</link><guid isPermaLink="true">https://www.jbbres.com/files/773322fe79f34baf16bf0215fb99b139-126.html#unique-entry-id-126</guid><content:encoded><![CDATA[I&rsquo;m happy to share that I&rsquo;ve obtained a new certification: Certified in Cybersecurity (CC) from (ISC)&sup2;!<br /><br /><p style="text-align:center;"><div data-iframe-width="150" data-iframe-height="270" data-share-badge-id="27b79e43-e3de-4476-b0cc-63847ba48d4f" data-share-badge-host="https://www.credly.com"></div><script type="text/javascript" async src="//cdn.credly.com/assets/utilities/embed.js"></script></p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Your Home under Cyber Attack</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2022-10-25T14:18:01+11:00</dc:date><link>https://www.jbbres.com/files/1b193773acd9cd84d61b688c9c177de4-125.html#unique-entry-id-125</link><guid isPermaLink="true">https://www.jbbres.com/files/1b193773acd9cd84d61b688c9c177de4-125.html#unique-entry-id-125</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;"><br />As Cyber Awareness Month is coming to an end and Halloween is almost upon us, I thought it would be a great time to share a few real cyber-horror stories, and how to protect yourself from them. <br /></p>]]></content:encoded></item><item><title>Free (ISC)&#xb2; Cybersecurity Certification Exams</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2022-09-04T17:21:30+10:00</dc:date><link>https://www.jbbres.com/files/a5165a0091b701851e80150a1902a83a-124.html#unique-entry-id-124</link><guid isPermaLink="true">https://www.jbbres.com/files/a5165a0091b701851e80150a1902a83a-124.html#unique-entry-id-124</guid><content:encoded><![CDATA[There are no excuses left to not do a security certification now <span style="font:12px AppleColorEmoji; ">😁</span><br /><a href="https://www.isc2.org/landing/1MCC" rel="external">(ISC)&sup2; Pledges One Million FREE (ISC)&sup2; Certified in Cybersecurity℠ Courses and Exams</a>]]></content:encoded></item><item><title>Open IT Risk Manager role</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2022-08-30T13:38:08+10:00</dc:date><link>https://www.jbbres.com/files/8ee448c99bf22ee2de038bb293197a86-122.html#unique-entry-id-122</link><guid isPermaLink="true">https://www.jbbres.com/files/8ee448c99bf22ee2de038bb293197a86-122.html#unique-entry-id-122</guid><content:encoded><![CDATA[HSBC is looking for a seasoned IT Risk Management in Australia! A great opportunity to join our incredible Technology and Cyber Security team if you have some experiences in that domain.<br /><br />Find out more and apply on <a href="https://mycareer.hsbc.com/en_GB/external/PipelineDetail/IT-Risk-Manager/159573" rel="external">HSBC career website</a>.]]></content:encoded></item><item><title>Janet Jackson had the power to crash laptop computers</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2022-08-25T15:31:19+10:00</dc:date><link>https://www.jbbres.com/files/96f7938c92a480e2004922bb0426e99c-120.html#unique-entry-id-120</link><guid isPermaLink="true">https://www.jbbres.com/files/96f7938c92a480e2004922bb0426e99c-120.html#unique-entry-id-120</guid><content:encoded><![CDATA[I think this might well be the coolest security vulnerability of the year! <span style="font:12px AppleColorEmoji; ">😂<br /></span><span style="font:12px AppleColorEmoji; "><br /></span><p style="text-align:center;"><a href="https://devblogs.microsoft.com/oldnewthing/20220816-00/?p=106994" rel="external"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/20220825001.png" width="426" height="257" /></a><br /></p>]]></content:encoded></item><item><title>Open Junior Cybersecurity Analyst role in HSBC Australia</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2022-06-16T18:26:46+10:00</dc:date><link>https://www.jbbres.com/files/cd384c634bde8abf35420e16be8bd5ef-118.html#unique-entry-id-118</link><guid isPermaLink="true">https://www.jbbres.com/files/cd384c634bde8abf35420e16be8bd5ef-118.html#unique-entry-id-118</guid><content:encoded><![CDATA[HSBC is looking for a junior Cybersecurity Analyst to join our fantastic team in Australia! A great opportunity to join HSBC incredible cyber capabilities if you are a recent graduate or have a little experience in that domain.<br /><br />If you are interested, please apply on <a href="https://mycareer.hsbc.com/en_GB/external/PipelineDetail/Cybersecurity-Analyst-Junior/51379?src=JB-257546" rel="external">our career website</a>.]]></content:encoded></item><item><title>&#xd83d;&#xdca1; The CIA Triad (explained to non-security people)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2022-06-12T15:01:55+10:00</dc:date><link>https://www.jbbres.com/files/2728d75c6db9cec6f30448dbb695b9b2-117.html#unique-entry-id-117</link><guid isPermaLink="true">https://www.jbbres.com/files/2728d75c6db9cec6f30448dbb695b9b2-117.html#unique-entry-id-117</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">A short article explaining what the CIA Triad is, or how Security is focusing on key concepts: Confidentiality, Integrity and Availability. <br />It's not always easy for non-security people to understand the challenges and endless efforts spent by security staff, so hopefully you will now have a better idea of why, and how, we do it.</p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Vulnerability Management (explained to non-security people)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2022-05-16T16:34:30+10:00</dc:date><link>https://www.jbbres.com/files/36f251213847989dcda72bd43282b92b-116.html#unique-entry-id-116</link><guid isPermaLink="true">https://www.jbbres.com/files/36f251213847989dcda72bd43282b92b-116.html#unique-entry-id-116</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">A short article explaining what is Vulnerability Management - one of the key areas of Information Security. <br />It's not always easy for non-security people to understand the challenges and endless efforts spent by security staff trying to remediate vulnerabilities, so hopefully you will now have a better idea of why, and how, we do it</p>]]></content:encoded></item><item><title>Australia&#x27;s overheated property market has become a target for hackers &#x2014; and they&#x27;re scamming millions</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2022-04-26T14:51:08+10:00</dc:date><link>https://www.jbbres.com/files/2850d74dd7e419618cdc113408df30e9-115.html#unique-entry-id-115</link><guid isPermaLink="true">https://www.jbbres.com/files/2850d74dd7e419618cdc113408df30e9-115.html#unique-entry-id-115</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://www.abc.net.au/news/science/2022-04-24/scammers-hackers-real-estate-deposit-property-settlement/101000288" rel="external"><img class="imageStyle" alt="Pasted Graphic" src="https://www.jbbres.com/files/20220426-001.png" width="427" height="256" /></a></p>]]></content:encoded></item><item><title>What&#x2c; exactly&#x2c; is cybersecurity? And why does it matter?</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2021-11-03T10:38:11+11:00</dc:date><link>https://www.jbbres.com/files/7ea698aeea15e34c12e23bb4ee4308b8-114.html#unique-entry-id-114</link><guid isPermaLink="true">https://www.jbbres.com/files/7ea698aeea15e34c12e23bb4ee4308b8-114.html#unique-entry-id-114</guid><content:encoded><![CDATA[I regularly get asked what are my job and my field (cybersecurity) about. It&rsquo;s a fair question. Cyberattacks steal data and cause millions in economic costs. <a href="https://www.zdnet.com/article/what-is-cybersecurity-and-why-cybersecurity-matters/" rel="external">This article</a> explains very broadly what cybersecurity professionals do.<span style="font:14px HelveticaNeue; color:#000000;"><br /></span><span style="font:14px HelveticaNeue; color:#000000;"><br /></span><p style="text-align:center;"><a href="https://www.zdnet.com/article/what-is-cybersecurity-and-why-cybersecurity-matters/" rel="external"><img class="imageStyle" alt="20211103-001" src="https://www.jbbres.com/files/20211103-001.jpg" width="426" height="257" /></a></p>]]></content:encoded></item><item><title>Congratulations Avenue Bank</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2021-09-08T09:15:43+10:00</dc:date><link>https://www.jbbres.com/files/d31e12cbdcfebf172f6a3b50fdfbf105-113.html#unique-entry-id-113</link><guid isPermaLink="true">https://www.jbbres.com/files/d31e12cbdcfebf172f6a3b50fdfbf105-113.html#unique-entry-id-113</guid><content:encoded><![CDATA[Congratulation to Avenue for <a href="https://www.avenuebank.com.au/news/apra-awards-avenue-bank-a-restricted-banking-licence" rel="external">getting its restricted banking licence</a>, and officially becoming <a href="https://www.avenuebank.com.au" rel="external">Avenue Bank</a>!<br />It was not an easy journey but it was not luck either, because they are an awesome and dedicated bunch. Looking forward for the next steps!<br /><br /><p style="text-align:center;"><a href="https://www.avenuebank.com.au/news/apra-awards-avenue-bank-a-restricted-banking-licence" rel="external"><img class="imageStyle" alt="20210908-001" src="https://www.jbbres.com/files/20210908-001.jpg" width="426" height="258" /></a><br /><br /></p>]]></content:encoded></item><item><title>Global News Podcast &#xd83c;&#xdfa7; Afghanistan Special</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Good Reads</category><dc:date>2021-08-31T07:26:38+10:00</dc:date><link>https://www.jbbres.com/files/5a26869e5a6e0da28948439d1e92b3e3-112.html#unique-entry-id-112</link><guid isPermaLink="true">https://www.jbbres.com/files/5a26869e5a6e0da28948439d1e92b3e3-112.html#unique-entry-id-112</guid><content:encoded><![CDATA[A <a href="https://www.bbc.co.uk/programmes/p09tlshj" rel="external">special episode</a> from the excellent BBC Global News Podcast, providing a very good understanding of the current situation in Afghanistan. I can only recommend listening if you want to understand what is happening there (and how it came to it).<br /><br /><p style="text-align:center;"><a href="https://www.bbc.co.uk/programmes/p09tlshj" rel="external"><img class="imageStyle" alt="20210831-001" src="https://www.jbbres.com/files/20210831-001.jpg" width="426" height="257" /></a></p>]]></content:encoded></item><item><title>Google says it created a time crystal in a quantum computer</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Good Reads</category><dc:date>2021-08-06T04:08:55+10:00</dc:date><link>https://www.jbbres.com/files/50e445df6eb54bc408740074f9ede771-111.html#unique-entry-id-111</link><guid isPermaLink="true">https://www.jbbres.com/files/50e445df6eb54bc408740074f9ede771-111.html#unique-entry-id-111</guid><content:encoded><![CDATA[Here is something cool  <span style="font:12px AppleColorEmoji; ">😎🔬</span>! Google says it has created a time crystal in a quantum computer (and if you do not know what a time crystal is, it is weirder than you think)<br /><p style="text-align:center;"><br /><a href="https://www.zdnet.com/article/google-says-it-has-created-a-time-crystal-in-a-quantum-computer-and-its-weirder-than-you-can-imagine/" rel="external"><img class="imageStyle" alt="20210806-001" src="https://www.jbbres.com/files/20210806-001.jpg" width="426" height="257" /></a></p>]]></content:encoded></item><item><title>Up to 1&#x2c;500 businesses infected in one of the worst ransomware attacks ever</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2021-07-09T09:56:06+10:00</dc:date><link>https://www.jbbres.com/files/6376f2a7481112b7d63ef8ecc3f2a6b1-110.html#unique-entry-id-110</link><guid isPermaLink="true">https://www.jbbres.com/files/6376f2a7481112b7d63ef8ecc3f2a6b1-110.html#unique-entry-id-110</guid><content:encoded><![CDATA[Interested in understanding how a large scale ransomware attack is performed? H<a href="https://arstechnica.com/gadgets/2021/07/up-to-1500-businesses-infected-in-one-of-the-worst-ransomware-attacks-ever/" rel="external">ere is a very good article from Ars Technica</a>. A bit technical, definitively scary... so a good read.<br /><p style="text-align:center;"><br /><a href="https://arstechnica.com/gadgets/2021/07/up-to-1500-businesses-infected-in-one-of-the-worst-ransomware-attacks-ever/" rel="external"><img class="imageStyle" alt="20210709-001" src="https://www.jbbres.com/files/20210709-001.jpg" width="426" height="253" /></a></p>]]></content:encoded></item><item><title>Critical CISO Initiatives for the Second Half of 2021</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2021-07-03T07:49:49+10:00</dc:date><link>https://www.jbbres.com/files/de1be6a161fdcbc258b2eb0b216d1a59-109.html#unique-entry-id-109</link><guid isPermaLink="true">https://www.jbbres.com/files/de1be6a161fdcbc258b2eb0b216d1a59-109.html#unique-entry-id-109</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://threatpost.com/critical-ciso-initiatives-2021/167309/" rel="external"><img class="imageStyle" alt="20210703-001" src="https://www.jbbres.com/files/20210703-001.jpg" width="427" height="252" /></a></p>]]></content:encoded></item><item><title>New role: HSBC</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2021-05-13T20:24:58+10:00</dc:date><link>https://www.jbbres.com/files/c67212692b93b1f40ced8da5723b5c5e-108.html#unique-entry-id-108</link><guid isPermaLink="true">https://www.jbbres.com/files/c67212692b93b1f40ced8da5723b5c5e-108.html#unique-entry-id-108</guid><content:encoded><![CDATA[I am very proud to announce that I have started a new role as Chief Information Security Officer, Australia and New-Zealand at <a href="https://www.hsbc.com.au" rel="external">HSBC</a>.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="HSBC-logo-1024x768" src="https://www.jbbres.com/files/hsbc-logo-1024x768.png" width="308" height="231" /></p>]]></content:encoded></item><item><title>The Lazarus Heist &#xd83c;&#xdfa7; Podcast</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2021-05-04T20:30:42+10:00</dc:date><link>https://www.jbbres.com/files/3467d37e1cac9b3b4381c9810a781ac2-107.html#unique-entry-id-107</link><guid isPermaLink="true">https://www.jbbres.com/files/3467d37e1cac9b3b4381c9810a781ac2-107.html#unique-entry-id-107</guid><content:encoded><![CDATA[If you are into podcasts, BBC World is producing a very good series on <a href="https://www.bbc.co.uk/programmes/w13xtvg9" rel="external">the hacking group Lazarus</a> and its ties to North Korea. The first episode goes in details through the Sony hack in 2014 as the movie "The Interview" was about to be released. It then moves onto how North Korea uses hacking to finance itself. Very interesting so far.<br /><br /><p style="text-align:center;"><a href="https://www.bbc.co.uk/programmes/w13xtvg9" rel="external"><img class="imageStyle" alt="Pasted Graphic" src="https://www.jbbres.com/files/pasted-graphic.png" width="427" height="251" /></a></p>]]></content:encoded></item><item><title>Stop using your work laptop or phone for personal stuff&#x2c; because I know you are</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2021-04-27T20:08:53+10:00</dc:date><link>https://www.jbbres.com/files/fa0f27e9cc5346408697c4f4e97c8ac8-106.html#unique-entry-id-106</link><guid isPermaLink="true">https://www.jbbres.com/files/fa0f27e9cc5346408697c4f4e97c8ac8-106.html#unique-entry-id-106</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://www.zdnet.com/article/stop-using-your-work-laptop-or-phone-for-personal-stuff-because-i-know-you-are/" rel="external"><img class="imageStyle" alt="20210427" src="https://www.jbbres.com/files/20210427.jpg" width="427" height="252" /></a></p>]]></content:encoded></item><item><title>New role: Introducing Avenue</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2021-02-14T10:40:48+11:00</dc:date><link>https://www.jbbres.com/files/f703d2afc5e5563f09312b95f44a356f-105.html#unique-entry-id-105</link><guid isPermaLink="true">https://www.jbbres.com/files/f703d2afc5e5563f09312b95f44a356f-105.html#unique-entry-id-105</guid><content:encoded><![CDATA[I am very proud to announce that I have started a new role as Chief Information Security Officer at <a href="https://www.avenue.net.au" rel="external">Avenue</a>.<br /><br /><p style="text-align:center;"><a href="https://www.avenue.net.au" rel="external"><img class="imageStyle" alt="Avenue_RED_RGB" src="https://www.jbbres.com/files/avenue_red_rgb.png" width="398" height="57" /></a><br /></p><p style="text-align:left;"><br />Avenue is building a dedicated business bank that finds new, flexible ways to free up cash flow for its customers. Whether you want to grow your business, buy some time, or simply have some breathing space, we'll free up cash with new options that other banks don't offer.<br /><br />Avenue isn't a bank (yet), but we're on our way. Find out more at <a href="https://www.avenue.net.au" rel="external">https://www.avenue.net.au</a></p>]]></content:encoded></item><item><title>Open to new opportunities</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><dc:date>2020-12-29T16:55:07+11:00</dc:date><link>https://www.jbbres.com/files/642c4c0d7d5a733f5b343b902a75240f-104.html#unique-entry-id-104</link><guid isPermaLink="true">https://www.jbbres.com/files/642c4c0d7d5a733f5b343b902a75240f-104.html#unique-entry-id-104</guid><content:encoded><![CDATA[As I mentioned in <a href="files/f71d836861f07c1ef2f38f25e5b563eb-103.html" title="Blog:Xinja is closing deposit accounts">my previous post</a>, Xinja Bank will stop operating as a bank in the next few weeks. <br /><br />For me, this sadly means that my role will stop to exist at the end of January 2021, so I will be looking for a new position shortly. <br />Thank you in advance for any connections, advice, or opportunities you can offer.<br /><br />You can contact me by <a href="projects/aaism_quiz/index.html" title="Contact">email</a> or via <a href="https://www.linkedin.com/in/jbbres/" rel="external">Linkedin</a>.]]></content:encoded></item><item><title>Xinja is closing deposit accounts</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Posts</category><category>Xinja</category><dc:date>2020-12-22T17:48:39+11:00</dc:date><link>https://www.jbbres.com/files/f71d836861f07c1ef2f38f25e5b563eb-103.html#unique-entry-id-103</link><guid isPermaLink="true">https://www.jbbres.com/files/f71d836861f07c1ef2f38f25e5b563eb-103.html#unique-entry-id-103</guid><content:encoded><![CDATA[Xinja Bank Account will soon be discontinued and the Xinja Stash will be discontinued from 23rd December 2020.<br /><br />It is a sad time for all of us at Xinja. We have worked hard to get there. But we have a lot to be proud of. We demonstrated to all that it was possible to build a bank from scratch, based on a modern cloud-based tech stack. <br />Some said we were the crazy ones. Maybe we were. But we created momentum. We lead the way. Other will come and continue what we started. Creating better banking, and better tomorrows. <br /><br />On a personal note, I am proud that Xinja has been rated  the most secure bank in Australia for 6 out of the last 12 months (and as per how Dec. is going so far, still is <span style="font:12px AppleColorEmoji; ">😁🏆</span>). Not a small achievement for the small team we were. <br /><br />Thanks to all past and present #xinjasecurity team members. It would not have been possible without you. <br />Kudo to <a href="https://www.linkedin.com/in/aron-mamsirov-966428b5/" rel="external">Aron</a>, <a href="https://www.linkedin.com/in/priyalbhosale/" rel="external">Priyal</a>, <a href="https://www.linkedin.com/in/richard-hawkes-a94b892/" rel="external">Richard</a>, <a href="https://www.linkedin.com/in/william-luo-97aa5092/" rel="external">Will</a>, <a href="https://www.linkedin.com/in/nicole-allen-58ba6024/" rel="external">Nicole</a>, <a href="https://www.linkedin.com/in/garybone/" rel="external">Gary</a>, <a href="https://www.linkedin.com/in/jeremy-nelson-it-ops/" rel="external">Jeremy</a> & <a href="https://www.linkedin.com/in/gregsteel/" rel="external">Greg</a>. You guys rock! <span style="font:12px AppleColorEmoji; ">🤘</span><br /><br />For more information about the closure of Xinja accounts, visit <a href="https://xinja.com.au/xinja-bank-accounts-and-stash-accounts-being-discontinued/" rel="external">https://xinja.com.au/xinja-bank-accounts-and-stash-accounts-being-discontinued/ </a>]]></content:encoded></item><item><title>In a time of change&#x2c; identity has become the key to security - Webminar</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><dc:date>2020-12-08T09:33:13+11:00</dc:date><link>https://www.jbbres.com/files/fe82ac207382c4bf8fddcba563f6bcac-102.html#unique-entry-id-102</link><guid isPermaLink="true">https://www.jbbres.com/files/fe82ac207382c4bf8fddcba563f6bcac-102.html#unique-entry-id-102</guid><content:encoded><![CDATA[I was honoured to discuss Identity and Security in the cloud with Nigel Phair and Serkan Cetin at the Quest Software webinar "<em>In a time of change, identity has become the key to security &ndash; and business continuity</em>" last week.<br /><br /><iframe src="https://www.linkedin.com/embed/feed/update/urn:li:ugcPost:6740486122750787585?compact=1" height="284" width="504" frameborder="0" allowfullscreen="" title="Embedded post"></iframe><p style="text-align:center;"><br /><br /></p><p style="text-align:left;">Check out the full video on <a href="https://www.gotostage.com/channel/75971f3e5d124c73846d4651cdd7ec1e/recording/5c9311ac0c4347b995c38214d21bf06d/watch" rel="external">GoToStage</a>.</p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Defence in Depth</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2020-10-27T09:38:54+11:00</dc:date><link>https://www.jbbres.com/files/42224062de5ab7161a8f5a04e7f401c4-101.html#unique-entry-id-101</link><guid isPermaLink="true">https://www.jbbres.com/files/42224062de5ab7161a8f5a04e7f401c4-101.html#unique-entry-id-101</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">"<strong>Defence in depth</strong>", sometime also called &ldquo;layering&rdquo; is a central concept in information security. It relates to the idea that security components should be designed so they provide redundancy in the event one of them was to fail.<br /><br />This article explores the concept of defence in depth, and how it applies to modern technology stacks and in the cloud.</p>]]></content:encoded></item><item><title>Xinja emails get maximum security score</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2020-10-20T09:56:44+11:00</dc:date><link>https://www.jbbres.com/files/b80921013b297a5cd0f1caee5d6e8e6d-100.html#unique-entry-id-100</link><guid isPermaLink="true">https://www.jbbres.com/files/b80921013b297a5cd0f1caee5d6e8e6d-100.html#unique-entry-id-100</guid><content:encoded><![CDATA[Email. It is hard to imagine life without it. Although invented back in the seventies, it became mainstream in the nineties. Unlike overalls and bandanas, it remained popular until this day. So popular in fact, that spam and so called &lsquo;spoofing&rsquo; has become a real threat on the internet. This is how Xinja keeps their emails super secure. <br /><br /><p style="text-align:center;"><a href="https://xinja.com.au/news/2020/xinja-emails-maximum-security/" rel="external"><img class="imageStyle" alt="20201020-001" src="https://www.jbbres.com/files/20201020-001.png" width="428" height="249" /></a></p>]]></content:encoded></item><item><title>Incident Response and Breach Impact Minimisation Panel</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><dc:date>2020-10-02T13:43:47+10:00</dc:date><link>https://www.jbbres.com/files/f79e3eea264d1a4d4bcdea30feab8cd6-99.html#unique-entry-id-99</link><guid isPermaLink="true">https://www.jbbres.com/files/f79e3eea264d1a4d4bcdea30feab8cd6-99.html#unique-entry-id-99</guid><content:encoded><![CDATA[I am looking forward to be part of the panel on <a href="https://app.livestorm.co/forefront-events/incident-response-1" rel="external">Incident Response and Breach Impact Minimisation</a> on Thursday October 8th 2020 (1pm - 1.50pm AEST) with <a href="https://www.linkedin.com/in/susiecosta/" rel="external">Susie Costa</a>, <a href="https://www.linkedin.com/in/alvinrubyono/" rel="external">Alvin Rubyono</a> and <a href="https://www.linkedin.com/in/stephenburmester/" rel="external">Stephen Burmeste</a>r.<br /><br />More than ever, Government, industry and businesses have been under increasing attacks. The Australian Cyber Security Centre (ACSC) recently published a report stating it had responded to approximately 2300 cyber security incidents between July 2019 and June 2020. But in these times with many staff working from home, if your business was to suffer from a cyber breach, would you be able to respond effectively? <br />We will discuss best practices in incident response and how to manage and minimise the impact of a breach on your business.<br /><br />More information at <a href="https://app.livestorm.co/forefront-events/incident-response-1" rel="external">https://app.livestorm.co/forefront-events/incident-response-1</a><br />]]></content:encoded></item><item><title>Xinja is now PCI DSS compliant certified</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Good Reads</category><category>Xinja</category><category>Cloud</category><dc:date>2020-09-22T11:13:40+10:00</dc:date><link>https://www.jbbres.com/files/7ba3e8772c94444f169f03546edc3e18-98.html#unique-entry-id-98</link><guid isPermaLink="true">https://www.jbbres.com/files/7ba3e8772c94444f169f03546edc3e18-98.html#unique-entry-id-98</guid><content:encoded><![CDATA[Xinja just got certified PCI DSS compliant! The PCI DSS compliance refers to the technical and operational standards that businesses must follow to secure and protect your credit and payment card data. These standards for compliance are developed and managed by the Payment Card Industry Security Standards Council. <br /><br />It is a huge milestone for us and, if you ever got through such a certification process, you would know how challenging it is! <br /><br />To mark the event, we published a short article on how we designed our environments to get compliance. So read more about it below:<br /><br /><p style="text-align:center;"><a href="https://xinja.com.au/news/2020/pci-compliance-security-praise/" rel="external"><img class="imageStyle" alt="20200922-001" src="https://www.jbbres.com/files/20200922-001.png" width="428" height="254" /></a></p>]]></content:encoded></item><item><title>Future of Security Conference</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><category>Financial Services</category><dc:date>2020-08-26T11:07:07+10:00</dc:date><link>https://www.jbbres.com/files/2486092ab4f58c50607c8c09952408fe-97.html#unique-entry-id-97</link><guid isPermaLink="true">https://www.jbbres.com/files/2486092ab4f58c50607c8c09952408fe-97.html#unique-entry-id-97</guid><content:encoded><![CDATA[I was honoured to be part of the FST Security conference on Monday, for a fireside chat around data privacy with <a href="https://www.linkedin.com/in/marksheppardsydney/" rel="external">Mark Sheppard</a> and a Security Leader's Panel with <a href="https://www.linkedin.com/in/larkinryder/" rel="external">Larkin Ryder</a>, <a href="https://www.linkedin.com/in/michelle-bower-1b65425/" rel="external">Michelle Bower</a> and <a href="https://www.linkedin.com/in/sumeetkukar/" rel="external">Sumeet Kukar</a>.<br />If you were not able to attend, you can still catch these sessions on the <a href="https://fst.net.au/event/future-security-melbourne-2020 " rel="external">conference website</a>.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="Interview" src="https://www.jbbres.com/files/interview.jpg" width="461" height="346" /></p>]]></content:encoded></item><item><title>Future of Security Conference</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><category>Financial Services</category><dc:date>2020-07-21T10:03:16+10:00</dc:date><link>https://www.jbbres.com/files/304366c5e0883ac0bb833c03057026b4-96.html#unique-entry-id-96</link><guid isPermaLink="true">https://www.jbbres.com/files/304366c5e0883ac0bb833c03057026b4-96.html#unique-entry-id-96</guid><content:encoded><![CDATA[After having to cancel the event back in March due to COVID-19, the Future of Security conference is back (online this time) from the 24/08.<br /><br />I am very honoured to be one of the speakers. I will be discussing the Australia Consumer Data Right (CDR), and how it can be used to champion privacy while spurring innovation.<br /><br />I will also be part of a panel discussing how emerging technologies are reshaping cyber security risks and controls, strategies to infuse security culture into financial services&rsquo; enterprise DNA.<br /><br />Find out more on the <a href="https://fst.net.au/event/future-security-melbourne-2020/" rel="external">conference website</a>.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="20200721-001" src="https://www.jbbres.com/files/20200721-001.jpg" width="560" height="294" /></p>]]></content:encoded></item><item><title>Understanding the Payload-Less Email Attacks Evading Your Security Team</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2020-06-05T15:27:48+10:00</dc:date><link>https://www.jbbres.com/files/f29b8869995e66825741e2faeee62871-95.html#unique-entry-id-95</link><guid isPermaLink="true">https://www.jbbres.com/files/f29b8869995e66825741e2faeee62871-95.html#unique-entry-id-95</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://threatpost.com/understanding-payload-less-email-attacks/156299/" rel="external"><img class="imageStyle" alt="Picture 1" src="https://www.jbbres.com/files/picture-1.png" width="428" height="353" /></a></p>]]></content:encoded></item><item><title>Read about Xinja&#x27;s Journey to the Cloud</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Posts</category><category>Xinja</category><category>Cloud</category><dc:date>2020-05-22T09:32:15+10:00</dc:date><link>https://www.jbbres.com/files/d96946cefcefcff79a1e0e65a14ca390-94.html#unique-entry-id-94</link><guid isPermaLink="true">https://www.jbbres.com/files/d96946cefcefcff79a1e0e65a14ca390-94.html#unique-entry-id-94</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://www.itnews.com.au/news/xinja-almost-abandoned-serverless-backend-built-for-apple-pay-548232" rel="external"><img class="imageStyle" alt="20200522" src="https://www.jbbres.com/files/20200522.png" width="509" height="334" /></a></p>]]></content:encoded></item><item><title>How to become a Fierce Female Leader in Cybersecurity Meetup</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Conferences</category><dc:date>2020-05-20T10:16:15+10:00</dc:date><link>https://www.jbbres.com/files/739caa4c03f87f3949f2af09f19f50f0-93.html#unique-entry-id-93</link><guid isPermaLink="true">https://www.jbbres.com/files/739caa4c03f87f3949f2af09f19f50f0-93.html#unique-entry-id-93</guid><content:encoded><![CDATA[I am very excited to participate with <a href="https://www.linkedin.com/in/joss-h-5571981/" rel="external">Joss Howard</a> at the very first <a href="https://www.meetup.com/en-AU/meetup-group-vQiJGqFi/events/270640959/" rel="external">Women in CyberSecurity Meetup</a> next week! Hopefully I will be able to provide some insightful perspective to all!<br /><br /><a href="https://www.meetup.com/en-AU/meetup-group-vQiJGqFi/events/270640959/" rel="external"><img class="imageStyle" alt="20200520" src="https://www.jbbres.com/files/20200520.jpeg" width="600" height="338" /></a>]]></content:encoded></item><item><title>Watch outs for Working From Home</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2020-04-14T10:02:50+10:00</dc:date><link>https://www.jbbres.com/files/48c5804dd5483d9cccb8eddbd53276df-92.html#unique-entry-id-92</link><guid isPermaLink="true">https://www.jbbres.com/files/48c5804dd5483d9cccb8eddbd53276df-92.html#unique-entry-id-92</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="https://xinja.com.au/news/2020/cybersecurity-watch-outs-working-from-home/" rel="external"><img class="imageStyle" alt="Screen Shot 2020-04-14 at 10.02.24" src="https://www.jbbres.com/files/screen-shot-2020-04-14-at-10.02.24.png" width="439" height="280" /></a></p>]]></content:encoded></item><item><title>Security GRC Manager role @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2020-04-08T09:52:33+10:00</dc:date><link>https://www.jbbres.com/files/3207c8f5de8d7c22067f698108be50df-91.html#unique-entry-id-91</link><guid isPermaLink="true">https://www.jbbres.com/files/3207c8f5de8d7c22067f698108be50df-91.html#unique-entry-id-91</guid><content:encoded><![CDATA[<span style="color:#000000;">We&rsquo;re on the hunt for a killer Security GRC Manager </span><span style="font:12px AppleColorEmoji; color:#000000;">🔒</span><span style="color:#000000;"> Must be highly skilled with excellent credentials. Ready to come help us build Australia's first (and best </span><span style="font:12px AppleColorEmoji; color:#000000;">😉</span><span style="color:#000000;">) neobank? Apply at </span><span style="color:#000000;"><a href="https://xinja.com.au/careers/security-grc-manager/" rel="external">https://xinja.com.au/careers/security-grc-manager/</a></span><span style="color:#000000;"><br /><br /></span><p style="text-align:center;"><a href="https://xinja.com.au/careers/security-grc-manager/" rel="external"><img class="imageStyle" alt="Screen Shot 2019-08-05 at 10.15.51" src="https://www.jbbres.com/files/screen-shot-2019-08-05-at-10.15.51.png" width="431" height="301" /></a></p>]]></content:encoded></item><item><title>Future of Security Conference&#x2c; Sydney</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><category>Financial Services</category><dc:date>2020-03-10T09:20:30+11:00</dc:date><link>https://www.jbbres.com/files/8f22467cd3ca42ebb93b5253c151c9bf-88.html#unique-entry-id-88</link><guid isPermaLink="true">https://www.jbbres.com/files/8f22467cd3ca42ebb93b5253c151c9bf-88.html#unique-entry-id-88</guid><content:encoded><![CDATA[<em>Unfortunately this event has been cancelled due to the COVID-19 outbreak, but it will be rescheduled for later on this year. Stay safe and see you all in a few month!</em><br /><br />I am very honoured to be one of the speakers at the next Future of Security conference in <a href="https://fst.net.au/conferences/future-security-melbourne-2020?mkt_tok=eyJpIjoiWlRaaFl6UXlNRGhtT0RGaCIsInQiOiI2ak5RNGtCdmU5NVR3SXBqZWwwMmJkOGZkeExaaG9zXC9FdmtlSUgxa1VtY1F0NmxwT1BCNDhaQWF5OXZEY2R0b2JldjRWelRMQVZ5V3puWE13c1wvZ1VxR3BqNzcyVUVpUE8rNjdcLzU1RG93cFJYS1h6eVNQRUFvY294blU5SHdPRyJ9" rel="external">Melbourne</a> on 24/03 and in <a href="https://fst.net.au/conferences/future-security-sydney-2020" rel="external">Sydney</a> on 26/03. I will be discussing the Australia Consumer Data Right (CDR), and how it can be used to champion privacy while spurring innovation.<br /><br />On the 26/03 (Sydney), I will also be part of a panel discussing how emerging technologies are reshaping cyber security risks and controls, strategies to infuse security culture into financial services&rsquo; enterprise DNA with <a href="https://fst.net.au/node/7129" rel="external">Wayne Bozza</a>, <a href="https://fst.net.au/node/9696" rel="external">Sarah O'Brien</a> and <a href="https://fst.net.au/node/9705" rel="external">Sumeet</a><a href="https://fst.net.au/node/9705" rel="external"> Kukar</a> and <a href="https://www.linkedin.com/in/ACoAAAAd5q0B62iM8ADsd8afF47B1E7LR0koHsw/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BpuSYtiRjSeeOPpM2f5A1qQ%3D%3D" rel="external">Larkin Ryder</a>.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="Future of Security" src="https://www.jbbres.com/files/future-of-security.jpeg" width="400" height="210" /><br /><br /></p>]]></content:encoded></item><item><title>CPS 234 NSW Morning Briefing</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><category>Regulation</category><category>Financial Services</category><dc:date>2020-02-21T13:04:09+11:00</dc:date><link>https://www.jbbres.com/files/ad4c3da5202fc2e081686ee429373b82-90.html#unique-entry-id-90</link><guid isPermaLink="true">https://www.jbbres.com/files/ad4c3da5202fc2e081686ee429373b82-90.html#unique-entry-id-90</guid><content:encoded><![CDATA[Thanks all for coming to our panel on strategies to prevent data breaches & improve incident response yesterday at the CPS 234 NSW morning briefing.<br />Thank you to <a href="https://www.linkedin.com/in/ACoAAAASM9IBkz0GxE693Ci8QmaCy6_yj8ui2iE/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BHw4WDVOPT5GNtX92vK0cDw%3D%3D" rel="external">Jason Anderson </a>and <a href="https://www.linkedin.com/in/ACoAAAagzLkBPY06co6n3MTM5MjQJawwjH0TI2E/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BUeDCAPZqRGSsp4IxJGRVhw%3D%3D" rel="external">Wayne Bozza</a> for their insightfull perspectives. And thanks to <a href="https://www.linkedin.com/in/ACoAAAcrzEEB7jKu-kAlTzXKwpLCHk3AtwkC6a8/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BHw4WDVOPT5GNtX92vK0cDw%3D%3D" rel="external">Paul Schofield</a> for his fantastic facilitation and direction.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="0-2" src="https://www.jbbres.com/files/0-2.jpg" width="616" height="322" /></p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Digital Identity and Authentication</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><category>IT Infrastructure</category><dc:date>2020-02-12T08:23:13+11:00</dc:date><link>https://www.jbbres.com/files/20200212-Identity-and-Auth.html#unique-entry-id-87</link><guid isPermaLink="true">https://www.jbbres.com/files/20200212-Identity-and-Auth.html#unique-entry-id-87</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">Time to go through the concepts of <strong>Digital Identity</strong> and <strong>Authentication</strong>, and how they are generally implemented in IT environments to automate access to websites, services and applications. <br /><br />While this article does not require any specific technical knowledge, it is not a trivial topic, and I have purposely tried to not oversimplify some of the concepts. I have done my best to keep it easy to read, but feel free to send some feedback if some parts are too complex and you would like further clarifications. </p>]]></content:encoded></item><item><title>CPS 234 NSW Morning Briefing</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><category>Regulation</category><category>Financial Services</category><dc:date>2020-02-07T13:29:10+11:00</dc:date><link>https://www.jbbres.com/files/b9a7031ca233ceb1e363c7b66ee5912f-89.html#unique-entry-id-89</link><guid isPermaLink="true">https://www.jbbres.com/files/b9a7031ca233ceb1e363c7b66ee5912f-89.html#unique-entry-id-89</guid><content:encoded><![CDATA[I am looking forward to be one of the speakers at the <a href="https://forefrontevents.com.au/event/cps234/" rel="external">CPS 234 NSW Morning Briefing</a> in Sydney on 20/02/2020 with 3 great experts: <a href="https://www.linkedin.com/in/ACoAAAEpXtMB1gMUxQAUXzQKcs0HFL2UfIfkvTw/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BqdklzYSdSmKerwhXkgKx8A%3D%3D" rel="external">Neil Hopkins</a>, <a href="https://www.linkedin.com/in/ACoAAAEVNfcBi7dVfEnsjNeQ1adSDpLE7E9jtI4/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BqdklzYSdSmKerwhXkgKx8A%3D%3D" rel="external">Susie Costa</a> and <a href="https://www.linkedin.com/in/ACoAAAagzLkBPY06co6n3MTM5MjQJawwjH0TI2E/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BqdklzYSdSmKerwhXkgKx8A%3D%3D" rel="external">Wayne Bozza</a>.<br /><br />With the passing of the July 1st deadline, ARPA regulated entities must meet the mandatory Prudential Standard CPS 234. The Standards have been created to improve resilience against information security threats, and those entities need to put the correct implementation strategy in place to safeguard themselves in the information age. <br /><br />A key objective is to minimise the likelihood and impact of information security incidents on the confidentiality, integrity or availability of information assets, including information assets managed by related parties or third parties. <br />]]></content:encoded></item><item><title>Ditch Dad Banking</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Posts</category><category>Xinja</category><dc:date>2020-01-16T09:44:30+11:00</dc:date><link>https://www.jbbres.com/files/4bf635afc60f2daedb67f0bd6cbadbcc-86.html#unique-entry-id-86</link><guid isPermaLink="true">https://www.jbbres.com/files/4bf635afc60f2daedb67f0bd6cbadbcc-86.html#unique-entry-id-86</guid><content:encoded><![CDATA[We are launching today our &ldquo;<a href="https://xinja.com.au/news/2020/ditch-dad-banking/" rel="external">Ditch Dad Banking</a>&rdquo; campaign and our <a href="https://xinja.com.au/news/2020/say-hello-to-stash/" rel="external">stashes</a> (saving accounts) with great interest rates and no fees or hidden rules! Awesome work all! Never been a best time to ditch your old bank <span style="font:12px AppleColorEmoji; ">😄<br /></span><span style="font:12px AppleColorEmoji; "><br /></span><iframe width="560" height="315" src="https://www.youtube.com/embed/QuBd-yZFRck" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><span style="font:12px AppleColorEmoji; "><br /></span>]]></content:encoded></item><item><title>DevOps role @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-12-18T11:28:47+11:00</dc:date><link>https://www.jbbres.com/files/52ecbdfb6ec547932b2ebb702e6fefee-85.html#unique-entry-id-85</link><guid isPermaLink="true">https://www.jbbres.com/files/52ecbdfb6ec547932b2ebb702e6fefee-85.html#unique-entry-id-85</guid><content:encoded><![CDATA[<span style="color:#000000;">A new security-related role we are recruiting for at Xinja: we are looking for a DevSecOps engineer. You&rsquo;ll be embedded in the DevOps team to facilitate continuous delivery of secure, quality software to the Xinja Banking Platform using DevSecOps practices and principles. You&rsquo;ll need to have a broad cross section of skills along with a strong consultative approach.<br /></span><span style="color:#000000;">You&rsquo;ll work with software engineers and security experts to ensure that the right practices are in place and to take the security lead on automating the path to production to enable deployment of changes with no manual intervention and in a highly secure manner.<br />We run a small, crack team of DevOps engineers to help us to build out a world class continuous integration and delivery pipeline for the Xinja Banking Platform as we continue to scale at pace. You will ensure security standards are upheld and secure coding practices maintained.<br /></span><span style="color:#000000;"><br />If you think this is something for you, </span><span style="color:#000000;"><a href="projects/aaism_quiz/index.html" title="Contact">contact me</a></span><span style="color:#000000;"> or visit </span><span style="color:#000000;"><a href="https://www.xinja.com.au/careers-2/" rel="external">Xinja career website</a></span><span style="color:#000000;"> for more information.<br /></span><span style="font:12px AppleColorEmoji; color:#000000;"><br /><br /></span><p style="text-align:center;"><a href="https://www.xinja.com.au/careers" rel="external"><img class="imageStyle" alt="DevSecOps" src="https://www.jbbres.com/files/devsecops.png" width="494" height="314" /></a><span style="color:#000000;"><br /></span></p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; What is Identity Theft? (a beginner guide)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2019-12-11T09:04:54+11:00</dc:date><link>https://www.jbbres.com/files/20191210-identity-theft.html#unique-entry-id-84</link><guid isPermaLink="true">https://www.jbbres.com/files/20191210-identity-theft.html#unique-entry-id-84</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">With Christmas coming fast, it is a great time to remember identity crime is a critical threat to the everyone. A short beginner guide on how to protect yourself against identity theft and what to do if your identity get stollen.</p>]]></content:encoded></item><item><title>Is Australia struggling from a bout of breach fatigue</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2019-11-27T10:26:34+11:00</dc:date><link>https://www.jbbres.com/files/70f85808e898d580e0773e0fbb377bad-83.html#unique-entry-id-83</link><guid isPermaLink="true">https://www.jbbres.com/files/70f85808e898d580e0773e0fbb377bad-83.html#unique-entry-id-83</guid><content:encoded><![CDATA[Another good read this week&hellip;<br /><p style="text-align:center;"><br /><a href="https://www.cso.com.au/article/669004/australia-struggling-from-bout-breach-fatigue/?utm_source=hs_email&utm_medium=email&utm_content=79847521&_hsenc=p2ANqtz-_BSTViIyxbrQ6Wk-zAQ9NmyzqwZn71o9NVHJR3zWqJskXLklvop1RAeX_HDoIzUB5fCxo21Z6ZOs-lG5FkNa5bfek3env8HBxv-5_o2eSUO6SEzEE&_hsmi=79847631" rel="external"><img class="imageStyle" alt="Screen Shot 2019-12-03 at 09.55.39" src="https://www.jbbres.com/files/screen-shot-2019-12-03-at-09.55.39.png" width="552" height="354" /></a></p>]]></content:encoded></item><item><title>The rise of the Neobanks: How they challenge traditional banking</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><category>Xinja</category><category>Financial Services</category><dc:date>2019-11-19T09:56:36+11:00</dc:date><link>https://www.jbbres.com/files/0d95d5b9dae521530b6a4561b4f1900b-82.html#unique-entry-id-82</link><guid isPermaLink="true">https://www.jbbres.com/files/0d95d5b9dae521530b6a4561b4f1900b-82.html#unique-entry-id-82</guid><content:encoded><![CDATA[Some good reading for the week on how neo banks are going to challenge traditional banking in Australia.<br /><br /><p style="text-align:center;"><a href="https://cfotech.com.au/story/the-rise-of-the-neobanks-how-they-challenge-traditional-banking" rel="external"><img class="imageStyle" alt="Screen Shot 2019-12-03 at 09.55.56" src="https://www.jbbres.com/files/screen-shot-2019-12-03-at-09.55.56.png" width="552" height="354" /></a></p>]]></content:encoded></item><item><title>Unto the breach: let&#x2019;s face up to data security</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-10-15T13:10:22+11:00</dc:date><link>https://www.jbbres.com/files/9a522cd8a0915d42e8fa61deabfd62f9-81.html#unique-entry-id-81</link><guid isPermaLink="true">https://www.jbbres.com/files/9a522cd8a0915d42e8fa61deabfd62f9-81.html#unique-entry-id-81</guid><content:encoded><![CDATA[We just published an article that talks about data security and how we, at <a href="https://www.xinja.com.au" rel="external">Xinja</a>, are protecting our customers. Let us know what you think!<br /><br /><p style="text-align:center;"><a href="http://bit.ly/2Mgu6yD" rel="external"><img class="imageStyle" alt="Screen Shot 2019-10-15 at 13.12.25" src="https://www.jbbres.com/files/screen-shot-2019-10-15-at-13.12.25.png" width="551" height="351" /></a><br /></p>]]></content:encoded></item><item><title>Cyber Attack Conference Sydney 2019</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Posts</category><dc:date>2019-09-24T09:03:49+10:00</dc:date><link>https://www.jbbres.com/files/61062775d2b5f02d8ec2ea32cce6851b-79.html#unique-entry-id-79</link><guid isPermaLink="true">https://www.jbbres.com/files/61062775d2b5f02d8ec2ea32cce6851b-79.html#unique-entry-id-79</guid><content:encoded><![CDATA[I am very honoured to be one of the speakers at the upcoming <a href="http://cyberattack-event.com/Sydney-2019.html" rel="external">Cyber Attack 2019 Conference in Sydney</a> on October 17th. I will be facilitating a round table discussion on how to implement a security Bring Your Own Device (BYOD) policy. ]]></content:encoded></item><item><title>Let&#x27;s. Go.</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Posts</category><category>Xinja</category><dc:date>2019-09-09T12:00:04+10:00</dc:date><link>https://www.jbbres.com/files/0cae04e8511ebfdc952a88ed30cc8e8f-78.html#unique-entry-id-78</link><guid isPermaLink="true">https://www.jbbres.com/files/0cae04e8511ebfdc952a88ed30cc8e8f-78.html#unique-entry-id-78</guid><content:encoded><![CDATA[Xinja has officially a full banking licence! We will be opening our first bank accounts today!  <span style="font:12px AppleColorEmoji; ">🥳</span><br /><br />Read more at <a href="https://www.xinja.com.au/news/2019/xinja-gets-full-banking-licence/" rel="external">https://www.xinja.com.au/news/2019/xinja-gets-full-banking-licence/</a> <span style="font:12px AppleColorEmoji; "><br /><br /></span><img class="imageStyle" alt="XINJA_1920x1280_FINAL" src="https://www.jbbres.com/files/xinja_1920x1280_final.gif" width="576" height="384" />]]></content:encoded></item><item><title>Xinja is #5 top startups to work for now&#x21; </title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Posts</category><category>Xinja</category><dc:date>2019-09-04T09:50:34+10:00</dc:date><link>https://www.jbbres.com/files/0d5913a15aa4dabb96bde48af6de229f-77.html#unique-entry-id-77</link><guid isPermaLink="true">https://www.jbbres.com/files/0d5913a15aa4dabb96bde48af6de229f-77.html#unique-entry-id-77</guid><content:encoded><![CDATA[Xinja is <a href="https://www.linkedin.com/pulse/linkedin-top-startups-2019-25-hottest-australian-work-macdonald/?trackingId=MJXh6wgAIrGHpHw%2Bb1QSKw%3D%3D" rel="external">#5 top startups</a> to work for now! <span style="font:12px AppleColorEmoji; ">🏆🏆</span>]]></content:encoded></item><item><title>Australian banks face secret penetration tests</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Financial Services</category><dc:date>2019-09-03T09:57:33+10:00</dc:date><link>https://www.jbbres.com/files/4fb95fedb477fd8bdd1343e63aa9db60-76.html#unique-entry-id-76</link><guid isPermaLink="true">https://www.jbbres.com/files/4fb95fedb477fd8bdd1343e63aa9db60-76.html#unique-entry-id-76</guid><content:encoded><![CDATA[An interesting initiative from NPP (which coordinate the open access infrastructure for fast payments in Australia, PayID). Following the PayID lookup attacks that occurred in the last months, they might now perform secret penetration tests to ensure that participating banks are up to the right level of protection. <span style="font:12px AppleColorEmoji; ">💡</span><br /><br />Read more at <a href="http://bit.ly/2lyNQT4" rel="external">http://bit.ly/2lyNQT4</a>]]></content:encoded></item><item><title>What will future jobs look like?</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><dc:date>2019-08-27T09:10:16+10:00</dc:date><link>https://www.jbbres.com/files/43a35cd1858cdd17a488ba05479b8937-75.html#unique-entry-id-75</link><guid isPermaLink="true">https://www.jbbres.com/files/43a35cd1858cdd17a488ba05479b8937-75.html#unique-entry-id-75</guid><content:encoded><![CDATA[A very interesting talk from economist Andrew McAfee on how jobs will change in the future. Yes, droids will take our jobs -- or at least the kinds of jobs we know now. In this far-seeing talk, he thinks through what future jobs might look like, and how to educate coming generations to hold them.<br /><br /><div style="max-width:854px"><div style="position:relative;height:0;padding-bottom:56.25%"><iframe src="https://embed.ted.com/talks/andrew_mcafee_what_will_future_jobs_look_like" width="854" height="480" style="position:absolute;left:0;top:0;width:100%;height:100%" frameborder="0" scrolling="no" allowfullscreen></iframe></div></div>]]></content:encoded></item><item><title>Super Risk Symposium - Melbourne 14/08</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Regulation</category><category>Conferences</category><category>Posts</category><dc:date>2019-08-14T15:40:46+10:00</dc:date><link>https://www.jbbres.com/files/e9adc44902b13369a23dd436822b8ab7-74.html#unique-entry-id-74</link><guid isPermaLink="true">https://www.jbbres.com/files/e9adc44902b13369a23dd436822b8ab7-74.html#unique-entry-id-74</guid><content:encoded><![CDATA[I was honoured to be one of the speakers at the <a href="http://www.aist.asn.au/super-symposium-risk/overview.aspx" rel="external">Super Risk Symposium</a> organised by the AIST in Melbourne on 14/08. <br /><br />It was a great session, on the impact of the new CPS 234 regulation, thanks to <a href="https://www.linkedin.com/in/ACoAAAC-E7UB5zQ3EyXGHQB9P9YNGnE01q7phoU/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_all%3BxO70pizkRWKa2lt8XTmNFQ%3D%3D" rel="external">Rob Pickering</a> who facilitated the debate and to <a href="https://www.linkedin.com/in/ACoAAAA0bhMBXOXBhSAWRKJa1MWwFLPUd8W-waw/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_all%3BxO70pizkRWKa2lt8XTmNFQ%3D%3D" rel="external">Joss Howard</a> and <a href="https://www.linkedin.com/in/ACoAAADdKssBJpYAC6yyTEc5HdMX7YWbZWvrErA/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_all%3BxO70pizkRWKa2lt8XTmNFQ%3D%3D" rel="external">Matt O'Keefe</a> for their great insights.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="UNADJUSTEDNONRAW_thumb_126" src="https://www.jbbres.com/files/unadjustednonraw_thumb_126.jpg" width="543" height="362" /></p>]]></content:encoded></item><item><title>Security Designer @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-08-07T11:31:41+10:00</dc:date><link>https://www.jbbres.com/files/eecf6a5dcfca20ecb5fc63ae00a42550-73.html#unique-entry-id-73</link><guid isPermaLink="true">https://www.jbbres.com/files/eecf6a5dcfca20ecb5fc63ae00a42550-73.html#unique-entry-id-73</guid><content:encoded><![CDATA[Last but not least, we are also hiring a Security Designer, a strategically critical role in defining and assessing Xinja&rsquo;s security strategy, architecture and practices.<br /><br /><span style="color:#000000;">If you think this is something for you, </span><span style="color:#000000;"><a href="projects/aaism_quiz/index.html" title="Contact">contact me</a></span><span style="color:#000000;"> or visit </span><span style="color:#000000;"><a href="https://www.xinja.com.au/careers-2/" rel="external">Xinja career website</a></span><span style="color:#000000;"> for more information.<br /><br /></span><p style="text-align:center;"><a href="https://www.xinja.com.au/security-designer/" rel="external"><img class="imageStyle" alt="Security Designer" src="https://www.jbbres.com/files/security-designer.jpg" width="494" height="314" /></a></p>]]></content:encoded></item><item><title>Info Sec GRC Manager @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-08-05T10:13:57+10:00</dc:date><link>https://www.jbbres.com/files/7f91bc95720f917ec85b30e2aa2e8ab0-72.html#unique-entry-id-72</link><guid isPermaLink="true">https://www.jbbres.com/files/7f91bc95720f917ec85b30e2aa2e8ab0-72.html#unique-entry-id-72</guid><content:encoded><![CDATA[Another great opening in the Xinja Security Team. We are looking for an Information Security GRC Manager!<br /><br />This is a key role for the organisation: You will manage the information risk and security governance, focussing on raising standards and awareness, as well as providing assurance and monitoring compliance with policies and standards. <br /><br /><span style="color:#000000;">If you think this is something for you, </span><span style="color:#000000;"><a href="projects/aaism_quiz/index.html" title="Contact">contact me</a></span><span style="color:#000000;"> or visit </span><span style="color:#000000;"><a href="https://www.xinja.com.au/careers-2/" rel="external">Xinja career website</a></span><span style="color:#000000;"> for more information.<br /><br />More openings coming soon&hellip; </span><span style="font:12px AppleColorEmoji; color:#000000;">😉<br /><br /></span><p style="text-align:center;"><a href="https://www.xinja.com.au/grc-manager/" rel="external"><img class="imageStyle" alt="Screen Shot 2019-08-05 at 10.15.51" src="https://www.jbbres.com/files/screen-shot-2019-08-05-at-10.15.51.png" width="431" height="301" /></a></p>]]></content:encoded></item><item><title>DevSecOps role @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-08-01T10:05:15+10:00</dc:date><link>https://www.jbbres.com/files/1f581e0330f3166c782f52966f1bb777-71.html#unique-entry-id-71</link><guid isPermaLink="true">https://www.jbbres.com/files/1f581e0330f3166c782f52966f1bb777-71.html#unique-entry-id-71</guid><content:encoded><![CDATA[<span style="color:#000000;">Another great new security-related role we are recruiting for at Xinja: we are looking for a DevSecOps engineer with a focus on security automation. You&rsquo;ll be embedded in the DevOps team to facilitate continuous delivery of secure, quality software to the Xinja Banking Platform using DevSecOps practices and principles. You&rsquo;ll need to have a broad cross section of skills along with a strong consultative approach.<br /></span><span style="color:#000000;">You&rsquo;ll work with software engineers and security experts to ensure that the right practices are in place and to take the security lead on automating the path to production to enable deployment of changes with no manual intervention and in a highly secure manner.<br />We run a small, crack team of DevOps engineers to help us to build out a world class continuous integration and delivery pipeline for the Xinja Banking Platform as we continue to scale at pace. You will ensure security standards are upheld and secure coding practices maintained.<br />You should know that we do things a little differently at Xinja. You won&rsquo;t be micromanaged and will have the flexibility to choose the tools you need to get your work done. Along with the team you work with, you&rsquo;ll be given autonomy on how you design and build DevSecOps processes as long as it stays within the guidance of the Xinja Software Development Lifecycle and Information Security Management System. You should be comfortable with pushing new tools and processes and challenging the norms of secure software development and deployment.<br /></span><span style="color:#000000;"><br />If you think this is something for you, </span><span style="color:#000000;"><a href="projects/aaism_quiz/index.html" title="Contact">contact me</a></span><span style="color:#000000;"> or visit </span><span style="color:#000000;"><a href="https://www.xinja.com.au/careers-2/" rel="external">Xinja career website</a></span><span style="color:#000000;"> for more information.<br /><br />More openings coming soon&hellip; </span><span style="font:12px AppleColorEmoji; color:#000000;">😉<br /><br /></span><p style="text-align:center;"><a href="https://www.xinja.com.au/devsecops-engineer/" rel="external"><img class="imageStyle" alt="DevSecOps" src="https://www.jbbres.com/files/devsecops.png" width="494" height="314" /></a><span style="color:#000000;"><br /></span></p>]]></content:encoded></item><item><title>Security Analyst role @ Xinja</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><category>Xinja</category><dc:date>2019-07-29T17:22:09+10:00</dc:date><link>https://www.jbbres.com/files/3e13bef9e51fc60b10c5d4406ba859b7-70.html#unique-entry-id-70</link><guid isPermaLink="true">https://www.jbbres.com/files/3e13bef9e51fc60b10c5d4406ba859b7-70.html#unique-entry-id-70</guid><content:encoded><![CDATA[I am recruiting a <strong>Security Analyst </strong>to join the fantastic security team at Xinja. The role will be responsible for assisting in building upon and improving Xinja&rsquo;s Information Security Program. You will be the primary technical security resource in a small team responsible for the day-to-day operations of the security of all things Xinja.<br /><br />If you think this is something for you, <a href="projects/aaism_quiz/index.html" title="Contact">contact me</a> or visit <a href="https://www.xinja.com.au/careers-2/" rel="external">Xinja career website</a> for more information.<br /><br />More openings coming soon&hellip; <span style="font:12px AppleColorEmoji; ">😉</span><br /><br /><p style="text-align:center;"><a href="https://www.xinja.com.au/security-analyst/" rel="external"><img class="imageStyle" alt="Security Analyst" src="https://www.jbbres.com/files/security-analyst.png" width="494" height="314" /></a></p>]]></content:encoded></item><item><title>Your inbox is spying on you</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2019-07-24T13:10:36+10:00</dc:date><link>https://www.jbbres.com/files/0e8c8ab459b37119e538c40c62c656f4-69.html#unique-entry-id-69</link><guid isPermaLink="true">https://www.jbbres.com/files/0e8c8ab459b37119e538c40c62c656f4-69.html#unique-entry-id-69</guid><content:encoded><![CDATA[It seems that Technology and Privacy still have a long road to go to work hand-in-hand. Security is still - for a lot of organisations - an afterthought and not an inherent part of the design. <br /><br /><em>"When we built [our company], we focused only on the needs of our customers. We did not consider potential bad actors."</em> <span style="font:12px AppleColorEmoji; ">😧</span><br /> <br />Read more: <a href="https://lnkd.in/gRWsFKW" rel="external">https://lnkd.in/gRWsFKW</a>]]></content:encoded></item><item><title>Super Risk Symposium - Melbourne 14/08</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Regulation</category><category>Conferences</category><category>Posts</category><dc:date>2019-07-17T22:10:13+10:00</dc:date><link>https://www.jbbres.com/files/1a7a7f8c12608cbdeb7da04021aeea9e-68.html#unique-entry-id-68</link><guid isPermaLink="true">https://www.jbbres.com/files/1a7a7f8c12608cbdeb7da04021aeea9e-68.html#unique-entry-id-68</guid><content:encoded><![CDATA[I am very honoured to be one of the speakers at the next <a href="http://www.aist.asn.au/super-symposium-risk/overview.aspx" rel="external">Super Risk Symposium</a> organised by the AIST in Melbourne on 14/08. I will be discussing being CPS compliant with 2 great experts: <a href="https://www.linkedin.com/in/joss-h-5571981/" rel="external">Joss Howard</a> (Head of Risk Management and Governance Consulting, APAC, NCC Group) and <a href="https://www.linkedin.com/in/mattokeefe/" rel="external">Matt O'Keefe</a> (Partner, KPMG).<br /><br /><em>Information security is all about risk management. With APRA&rsquo;s CPS 234 framework now live, how do funds need to be secured and why? What is an acceptable risk? And what is the lasting impact if valuable data is compromised, exposed or unavailable?<br />This session will explore how funds are demonstrating compliance with the new prudential standard and the strategies being used in safeguarding systems against information security threats.<br /></em><em><br /></em>[Update] Info and tickets at <a href="https://bit.ly/2GGHp8v" rel="external">https://bit.ly/2GGHp8v</a>]]></content:encoded></item><item><title>RBA details disaster recovery efforts</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Business Continuity</category><category>Good Reads</category><dc:date>2019-07-09T21:33:12+10:00</dc:date><link>https://www.jbbres.com/files/e1897a0168aaa20ce1b11770f96e2ae5-16.html#unique-entry-id-16</link><guid isPermaLink="true">https://www.jbbres.com/files/e1897a0168aaa20ce1b11770f96e2ae5-16.html#unique-entry-id-16</guid><content:encoded><![CDATA[Disaster Recovery is a complex exercise. For the few of us who had to manage a crisis and ensure a full recovery of critical business activities, we know that despite all the planning, testing and simulation we have done, there are always elements we did not foresee.<br /><br />In August 2018, the Reserve Bank of Australia faced a disruption to the power supplying the data centre at one of its site (primary and backup) due to a vendor error. Then multiple factors, from super-high security to plain bad luck, made the recovery difficult, and the bank did not manage to recover within their recovery time objective (RTO). <br /><a href="https://www.itnews.com.au/news/rba-confesses-all-in-outage-autopsy-526592" rel="external">This article details the extent of the events</a>. It is a very interesting story for everybody interested in continuity and disaster recovery. And also kudo to the RBA for the retrospective analysis of their own efforts, their honesty about what did not go as well as planned, and their transparency in sharing their findings with the rest of the industry.<br />]]></content:encoded></item><item><title>Is your cybersecurity training reaching the right people?</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Good Reads</category><dc:date>2019-06-11T19:57:27+10:00</dc:date><link>https://www.jbbres.com/files/cc99a46947cbb4af8099b6aae865b050-15.html#unique-entry-id-15</link><guid isPermaLink="true">https://www.jbbres.com/files/cc99a46947cbb4af8099b6aae865b050-15.html#unique-entry-id-15</guid><content:encoded><![CDATA[People attitude toward security is probably the most important factor when it comes to ensure a good Security strategy is in place. Even with the right technical protections, if people do not act carefully, it is not going to work out! So awareness is key. And targeting the right audience is critical to ensure the right outcome. On that topic, ZDNet published an interesting article titled: <a href="https://www.zdnet.com/article/is-your-cybersecurity-training-reaching-the-right-people/" rel="external">Is your cybersecurity training reaching the right people?</a>]]></content:encoded></item><item><title>Want to Take Better Notes? Ditch the Laptop for a Pen and Paper</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><dc:date>2019-06-04T19:23:15+10:00</dc:date><link>https://www.jbbres.com/files/56cf9acb895fa3e58e8d5ae94a132d70-9.html#unique-entry-id-9</link><guid isPermaLink="true">https://www.jbbres.com/files/56cf9acb895fa3e58e8d5ae94a132d70-9.html#unique-entry-id-9</guid><content:encoded><![CDATA[An interesting read about how using pen and paper helps you to take better notes than using a computer: <a href="http://bit.ly/2XkX8QU" rel="external">Want to Take Better Notes? Ditch the Laptop for a Pen and Paper, Says Science</a><br /><br />I personally always struggled taking notes on a computer and have been a fierce user of notebooks (especially since I discovered <a href="http://bit.ly/2Xk8BA5" rel="external">reusable ones</a>). Well now I will have an even better excuse to continue doing so <span style="font:12px AppleColorEmoji; ">😄</span><br />]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Conference Transcript: Building an Information Security Policy Framework</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Conferences</category><category>Regulation</category><category>Articles</category><dc:date>2019-05-20T20:53:25+10:00</dc:date><link>https://www.jbbres.com/files/20190605-security-framework.html#unique-entry-id-8</link><guid isPermaLink="true">https://www.jbbres.com/files/20190605-security-framework.html#unique-entry-id-8</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">Following my presentation on Building an Information Security Policy Framework at the "Implementing CPS 234" conference held in Sydney in May 2019, I received many requests to publish a transcript. Thank you all for your interest and for the large amount of feedback you shared with me. As promised, here is an augmented transcript of my presentation.<br /><br />It covers an <strong>overview of what a Policy Framework is</strong>, and why it is an essential part of any Information Security program; the various existing <strong>frameworks used across the industry</strong>, their strengths and limitations; a methodology to <strong>create a flexible framework</strong>, supported by a risk assessment and a strong understanding of the assets owned by the institution and the threats they are exposed to; and an approach to define an <strong>adequate control set</strong> and how to prioritise its implementation.</p>]]></content:encoded></item><item><title>Microsoft Patches &#x2018;Wormable&#x2019; Flaw in Windows XP&#x2c; 7 and Windows 2003</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>IT Infrastructure</category><category>Posts</category><dc:date>2019-05-14T19:30:39+10:00</dc:date><link>https://www.jbbres.com/files/e70ee8882091e2f7722f489826c1017f-10.html#unique-entry-id-10</link><guid isPermaLink="true">https://www.jbbres.com/files/e70ee8882091e2f7722f489826c1017f-10.html#unique-entry-id-10</guid><content:encoded><![CDATA[Microsoft today is taking the unusual step of releasing security updates for unsupported but still widely-used Windows operating systems like XP and Windows 2003, citing the discovery of a &ldquo;wormable&rdquo; flaw that the company says could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017. Read more at <a href="http://bit.ly/2Xr3Kgv" rel="external">http://bit.ly/2Xr3Kgv</a>]]></content:encoded></item><item><title>Tapping into the power of humble narcissism</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><dc:date>2019-05-07T19:32:44+10:00</dc:date><link>https://www.jbbres.com/files/afd170dfc74b555430855dffbddd177c-11.html#unique-entry-id-11</link><guid isPermaLink="true">https://www.jbbres.com/files/afd170dfc74b555430855dffbddd177c-11.html#unique-entry-id-11</guid><content:encoded><![CDATA[No, &ldquo;humble narcissism&rdquo; is not an oxymoron; it&rsquo;s a combination of qualities that the best leaders and companies have. Organizational psychologist Adam Grant explains why in this interesting <a href="http://bit.ly/2wE7tLK" rel="external">TED article</a>.<br />]]></content:encoded></item><item><title>First State Super integrates advice&#x2c; overhauls leadership</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Financial Services</category><category>Posts</category><dc:date>2019-04-18T19:35:23+10:00</dc:date><link>https://www.jbbres.com/files/6e0fc59a205567a5b873bb637ceef3d2-12.html#unique-entry-id-12</link><guid isPermaLink="true">https://www.jbbres.com/files/6e0fc59a205567a5b873bb637ceef3d2-12.html#unique-entry-id-12</guid><content:encoded><![CDATA[<br />First State Super has fully integrated its financial advice business, StatePlus.<br /><br />In a move aimed at making financial advice accessible for all its members, the $70 billion fund has brought its financial advice business StatePlus in-house. Read more at <a href="http://bit.ly/2XqxFFu" rel="external">http://bit.ly/2XqxFFu</a>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Creating a Secure Bring-Your-Own-Device Strategy</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>IT Infrastructure</category><category>Articles</category><dc:date>2019-03-24T11:56:06+11:00</dc:date><link>https://www.jbbres.com/files/20190324-byod-strategy.html#unique-entry-id-7</link><guid isPermaLink="true">https://www.jbbres.com/files/20190324-byod-strategy.html#unique-entry-id-7</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><strong><br /></strong></p><p style="text-align:left;"><strong>Corporate reality is that there is a growing interest from employees to use their personal devices for work.  </strong>This can have a very positive impact on business &ndash; choosing which device is best for them and when, empowers workers and makes them more productive &ndash; but it also raises many security concerns for the enterprise &ndash; especially around access, confidentiality of information, compliance, security and privacy.<span style="font-size:11px; "><br /></span><span style="font-size:11px; "><br /></span></p><p style="text-align:center;"><img class="imageStyle" alt="Factsheet" src="https://www.jbbres.com/files/factsheet.png" width="549" height="244" /><br /></p><p style="text-align:left;"><br />In order to define how employees will be able to interact with the corporate resources, the <strong>Bring-Your-Own-Device </strong>(BYOD) strategy is a critical part of your journey toward BYOD. It is there to define the capabilities your organisation offers to employees to use their personal laptops, smartphones or tablets for work. <br /><br />To assist you in your journey, this article covers how to answer these questions and what are the options available for you in order to create a secure BYOD strategy.</p>]]></content:encoded></item><item><title>How to keep human bias out of AI</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><dc:date>2019-03-05T19:37:21+11:00</dc:date><link>https://www.jbbres.com/files/03f98c559590b0d9f16367712097853a-13.html#unique-entry-id-13</link><guid isPermaLink="true">https://www.jbbres.com/files/03f98c559590b0d9f16367712097853a-13.html#unique-entry-id-13</guid><content:encoded><![CDATA[As I have recently been working on a new Data Strategy, taking into consideration how Artificial Intelligence (AI) can help us to provide better insights and advises to our customers, it is also the right time to consider the risks associated to such technology. I'm not talking about <span style="font:12px AppleColorEmoji; ">🤖 </span>Skynet taking over the world <span style="font:12px AppleColorEmoji; ">😉 </span>but how, if not well use, AI can reinforce human bias instead of helping us being better advisors!<br /><br /><a href="http://bit.ly/2XpiZq9" rel="external">Here is a great talk from Kriti Sharma @ TED</a> on how to keep human bias out of AI.<br /><div style="max-width:854px"><div style="position:relative;height:0;padding-bottom:56.25%"><iframe src="https://embed.ted.com/talks/kriti_sharma_how_to_keep_human_biases_out_of_ai" width="854" height="480" style="position:absolute;left:0;top:0;width:100%;height:100%" frameborder="0" scrolling="no" allowfullscreen></iframe></div></div>]]></content:encoded></item><item><title>&#x22;Implementing CPS 234&#x22; conference </title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Regulation</category><category>Conferences</category><category>Posts</category><dc:date>2019-02-23T06:12:34+11:00</dc:date><link>https://www.jbbres.com/files/f5d671b6202251355229dfb11c26c5ee-6.html#unique-entry-id-6</link><guid isPermaLink="true">https://www.jbbres.com/files/f5d671b6202251355229dfb11c26c5ee-6.html#unique-entry-id-6</guid><content:encoded><![CDATA[I am very proud and excited to be one of the key speakers at the <a href="https://www.criterionconferences.com/event/cps-234-conference/" rel="external">"Implementing CPS 234" conference </a>on 3rd May in Sydney. <br /><br />I will be talking on how to build an information security policy framework that is agile to changing threats.<br /><br />]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Public Cloud &#x2601;&#xfe0f; - Australia and New Zealand Regulatory Landscapes</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Regulation</category><category>Cloud</category><category>Articles</category><dc:date>2019-01-10T19:22:47+11:00</dc:date><link>https://www.jbbres.com/files/20190126-Cloud-Regulatory-Landscape.html#unique-entry-id-5</link><guid isPermaLink="true">https://www.jbbres.com/files/20190126-Cloud-Regulatory-Landscape.html#unique-entry-id-5</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><strong><br /></strong></p><p style="text-align:left;"><strong>More than ever, financial institutions in Australia and New Zealand are moving toward public cloud computing as a way to benefit from easy to use, flexible, cost effective and reliable infrastructures and services.</strong> Despite its substantial benefits, cloud computing also creates a complex new environment for financial institutions to navigate. Regulators in Australia and New Zealand are evolving their requirements and guidelines. It results in a growing expectation that financial institutions have a robust governance over their outsourcing process and ensure a high level of oversight of their cloud service providers. This article discusses the regulatory requirements around usage of Cloud Services in Australia and New Zealand and how to satisfy them.</p>]]></content:encoded></item><item><title>Microsoft is privately testing &#x27;Bali&#x2c;&#x27; a way to give users control of data collected about them</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>IT Infrastructure</category><category>Good Reads</category><dc:date>2019-01-08T19:40:44+11:00</dc:date><link>https://www.jbbres.com/files/490929003ab6f5ade865ea1dce20c570-14.html#unique-entry-id-14</link><guid isPermaLink="true">https://www.jbbres.com/files/490929003ab6f5ade865ea1dce20c570-14.html#unique-entry-id-14</guid><content:encoded><![CDATA[Some cool stuff coming from Microsoft... <a href="https://zd.net/2XqilsC" rel="external">Microsoft Research is looking to provide users with access to their own 'personal data bank'</a> via its 'Project Bali' effort.]]></content:encoded></item><item><title>How to break bad management habits before they reach the next generation of leaders</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Good Reads</category><dc:date>2019-01-05T20:00:54+11:00</dc:date><link>https://www.jbbres.com/files/592328c63be49bcf06510af6b935572d-17.html#unique-entry-id-17</link><guid isPermaLink="true">https://www.jbbres.com/files/592328c63be49bcf06510af6b935572d-17.html#unique-entry-id-17</guid><content:encoded><![CDATA[How to break bad management habits before they reach the next generation of leaders | a great talk by Elizabeth Lyle<br /><br /><div style="max-width:854px"><div style="position:relative;height:0;padding-bottom:56.25%"><iframe src="https://embed.ted.com/talks/elizabeth_lyle_how_to_break_bad_management_habits_before_they_reach_the_next_generation_of_leaders" width="854" height="480" style="position:absolute;left:0;top:0;width:100%;height:100%" frameborder="0" scrolling="no" allowfullscreen></iframe></div></div>]]></content:encoded></item><item><title>Happy New Year 2019&#x21; &#xd83c;&#xdf89;</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2019-01-01T13:56:56+11:00</dc:date><link>https://www.jbbres.com/files/10a378d7b543b82651f5281400a80264-3.html#unique-entry-id-3</link><guid isPermaLink="true">https://www.jbbres.com/files/10a378d7b543b82651f5281400a80264-3.html#unique-entry-id-3</guid><content:encoded><![CDATA[The New Year is here! Look ahead, embark on the road to success. May you have a great journey to your destination! Happy 2019.]]></content:encoded></item><item><title>What the Marriott Breach Says About Security</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2018-12-02T20:04:23+11:00</dc:date><link>https://www.jbbres.com/files/72c2606baf91e118ea05dfc339263076-18.html#unique-entry-id-18</link><guid isPermaLink="true">https://www.jbbres.com/files/72c2606baf91e118ea05dfc339263076-18.html#unique-entry-id-18</guid><content:encoded><![CDATA[Marriott disclosed earlier this week a four-year-long breach. It involved the personal and financial information of 500 million guests of some of its hotel properties. <br />What could have gone so wrong that such a breach remained unnoticed for so long? <a href="https://krebsonsecurity.com/2018/12/what-the-marriott-breach-says-about-security/" rel="external">This great article</a> shares some considerations around the security postures that companies take on, and why they work... or not.]]></content:encoded></item><item><title>&#xd83d;&#xdca1; APRA CPS 234: Are you ready?</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Regulation</category><category>Articles</category><dc:date>2018-11-13T19:48:45+11:00</dc:date><link>https://www.jbbres.com/files/20181113-APRA-CPS234.html#unique-entry-id-2</link><guid isPermaLink="true">https://www.jbbres.com/files/20181113-APRA-CPS234.html#unique-entry-id-2</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><strong><br /></strong></p><p style="text-align:left;"><strong>The Australian Prudential Regulation Authority (APRA) just published the </strong><strong>final version</strong><strong> of the Prudential Standard CPS 234 (Information Security), that will be enforceable by 1 July 2019. Have you assessed your readiness?</strong> This article reviews the main expectations from the regulator and provides some guidance on how to ensure timely compliance.<br /></p>]]></content:encoded></item><item><title>Facebook Security Breach Exposes Accounts of 50 Million Users</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Posts</category><dc:date>2018-09-29T20:06:00+10:00</dc:date><link>https://www.jbbres.com/files/a5d8b5cf40aad09431fe05060d6f1ed4-19.html#unique-entry-id-19</link><guid isPermaLink="true">https://www.jbbres.com/files/a5d8b5cf40aad09431fe05060d6f1ed4-19.html#unique-entry-id-19</guid><content:encoded><![CDATA[<a href="https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html" rel="external">Facebook is breached, putting 50 Million users&rsquo; data at risk</a>. Great time to ask yourself what data you are making available on the net, and what would you do if it ends ends available to all because of a breach? Maybe it&rsquo;s time to close your social network accounts that are not providing you any real value?...]]></content:encoded></item><item><title>Open Position: Database Administrator</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2018-09-07T20:07:41+10:00</dc:date><link>https://www.jbbres.com/files/4a304e8917306cd4f025d528ccff3390-20.html#unique-entry-id-20</link><guid isPermaLink="true">https://www.jbbres.com/files/4a304e8917306cd4f025d528ccff3390-20.html#unique-entry-id-20</guid><content:encoded><![CDATA[I am looking for an experience DataBase Engineer to join our fantastic data team. Great opportunity to get a great job in a leading financial institution and to work on exciting technologies! <br />Apply at <a href="https://lnkd.in/gvGH49w" rel="external">https://lnkd.in/gvGH49w</a> or feel free to contact me if you have any question!]]></content:encoded></item><item><title>Open Position: Senior Information Security Analyst (Sydney)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2018-07-15T20:11:51+10:00</dc:date><link>https://www.jbbres.com/files/76a9e567a819333feec1fb4625acfe73-22.html#unique-entry-id-22</link><guid isPermaLink="true">https://www.jbbres.com/files/76a9e567a819333feec1fb4625acfe73-22.html#unique-entry-id-22</guid><content:encoded><![CDATA[I am looking for a <a href="https://hcm613.peoplestreme.net/stateplus17ne2017/erec_candidate_job.asp?id=6168&src=ext" rel="external">Senior Information Security Analyst</a> to complement my team. We have lot of interesting projects and activities coming up! Let me know if you are interested. (no agencies please)]]></content:encoded></item><item><title>Open Position: Senior Security Analyst (Melbourne)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2018-05-09T20:13:19+10:00</dc:date><link>https://www.jbbres.com/files/2d14c973e0b8e90d542ae9a433b956bf-23.html#unique-entry-id-23</link><guid isPermaLink="true">https://www.jbbres.com/files/2d14c973e0b8e90d542ae9a433b956bf-23.html#unique-entry-id-23</guid><content:encoded><![CDATA[First State Super is looking for a Senior Security Analyst in Melbourne. Great opportunity to work for in a performing and innovative security team and on a large scale of interesting topics!<br />(Apply at <a href="http://www.seek.com.au/Job/35848731/?cid=ios-share" rel="external">http://www.seek.com.au/Job/35848731/?cid=ios-share</a> - no agency please)]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Security 101 &#x2013; Why is it not safe to share sensitive information by email?</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>Articles</category><dc:date>2018-04-02T22:08:56+10:00</dc:date><link>https://www.jbbres.com/files/20180402-email-security.html#unique-entry-id-1</link><guid isPermaLink="true">https://www.jbbres.com/files/20180402-email-security.html#unique-entry-id-1</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><strong><br /></strong></p><p style="text-align:left;"><strong>You are regularly being reminded by your security team that sharing sensitive information by email is not safe. But why?</strong> Well, good question. Here are some answers</p>]]></content:encoded></item><item><title>&#xd83d;&#xdca1; Understanding Meltdown and Spectre</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Security</category><category>IT Infrastructure</category><category>Cloud</category><category>Articles</category><dc:date>2018-01-08T20:38:00+11:00</dc:date><link>https://www.jbbres.com/files/20180107-meltdown-spectre.html#unique-entry-id-0</link><guid isPermaLink="true">https://www.jbbres.com/files/20180107-meltdown-spectre.html#unique-entry-id-0</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><strong><br /></strong></p><p style="text-align:left;"><strong>As an executive or senior manager, what should I know and what should my company be doing about Meltdown and Spectre?</strong> <br />If you are not an IT Security specialist and you have been trying to understand what all the fuss is about - you are probably struggling to find articles that are not overly technical or too generic. Hopefully, this one will be answer your questions.<span style="font:11px .AppleSystemUIFont; "><br /></span></p>]]></content:encoded></item><item><title>Action(s) might rise again</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2013-12-21T16:18:50+11:00</dc:date><link>https://www.jbbres.com/files/386e244b259aeef8033c0930b8d5cad9-24.html#unique-entry-id-24</link><guid isPermaLink="true">https://www.jbbres.com/files/386e244b259aeef8033c0930b8d5cad9-24.html#unique-entry-id-24</guid><content:encoded><![CDATA[In my <a href="files/9bf60bab52154e12674b5c6e16184b5f-25.html" title="Blog:End of support (at least for now)">previous post</a>, I was announcing the end of support of Action(s). I have been receving a lot of emails and message supporting Action(s) and some ideas to have this incredible tool continue to work and evolve.<br /><br />Obviously, as I mentionned previously, I cannot continue to work on Action(s) in the current situation. I do not have time to do so. To be able to evolve, I should be able to dedicate part or full of my professional time to it. Due to my current job, part time is not an option, and full time would be possible only if Action(s) was actually creating an income, which it is not.<br /><br />One of the solutions that have been suggested to me would be to try raising some funds via a crowdfunding platform. I like this idea. If I could raise enough funds to pay myself, I could dedicate myself full time to this project and update and upgrade Action(s) to a new level.<br />However, to be viable, such a solution would mean that, ultimately, Action(s) would also became a paying tool. Yes, not free anymore. Probably only a few dollars, but not free. Why? Because is Action(s) could rise thanks to <a href="http://en.wikipedia.org/wiki/Crowdfunding" rel="external">crowfunding</a>, a business model is also required to keep it aflow. People that helped with the funding would get a license for free, but new users, ultimately, would be what will make the tool running.<br /><br />It would not need too much money to start. But I do not know yet if it would possible to raise it. I will be working on that in the coming months...<br /><br />Feel free to share with me what you think about this idea, and also to let me know if you would be ready to participate to such a funding, to pay for the tool, or what new functionalities you would like to see to make this interresting...]]></content:encoded></item><item><title>End of support (at least for now)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2013-11-10T14:44:54+11:00</dc:date><link>https://www.jbbres.com/files/9bf60bab52154e12674b5c6e16184b5f-25.html#unique-entry-id-25</link><guid isPermaLink="true">https://www.jbbres.com/files/9bf60bab52154e12674b5c6e16184b5f-25.html#unique-entry-id-25</guid><content:encoded><![CDATA[Dear users,<br /><br /><em>[Update 21/12/2013] As a few users have been asking, Action(s) is now available as a standalone application at </em><em><a href="http://app.jbbres.com/jws/app/Actions-1.1.8-standalone.zip" rel="external">http://app.jbbres.com/jws/app/Actions-1.1.8-standalone.zip</a></em><em>. Make sure that you have </em><em><a href="http://www.java.com/" rel="external">Java</a></em><em> installed. </em><br /><br />It has been 4 years now since the introduction of Action(s). 4 great and interresting years. Action(s) has been downloaded over a million time and we got a lot of great feedback from all around the world!<br /><br />Unfortunatelly, as for anything in the world, Action(s) needs time and money to live.<br /><br />For time, I have unfortunatelly to admit that, though I have tried various options, I do not have any to spend on this project anymore. My real work - the one that pays my bills - is more and more demanding, which give me less time for my family and personal projects. Choises have to be made. Unfortunatelly I have to let down Action(s), at least for a while.<br /><br />As per money, I was hoping that donations would help to pay the expenses associated with the development of Action(s): hosting, software etc. Unfortunately, over 4 years and with all the users that show support, donations have always remain very low. Not enough the pay the bills. Far from it.<br /><br />It is therefore time to put the Action(s) project on hold. Hopefully not for ever, but for a while. The time for me to concentrate on my carreer and my family. <br /><br />The project will remain online, but no more support or new version will be posted in the coming future. Our <a href="http://app.jbbres.com/forum" rel="external">forum</a> will also stay online. It will remain a place where users can assist each other.<br />I however remain open to hear you if you are interrested to take over the work under one form or another. Feel free to <a href="projects/aaism_quiz/index.html" title="Contact">contact me</a>.<br /><br />Thanks again to all of you for your interrest, support, ideas, donations... It was a great time for me. Hopefully Action(s) has been usefull for you too.<br /><br />Regards,<br /><br />Jean-Baptiste Bres]]></content:encoded></item><item><title>Time for a good action - City2Surf 2012</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2012-05-26T07:29:29+10:00</dc:date><link>https://www.jbbres.com/files/87602421014256fb495336082c04135b-26.html#unique-entry-id-26</link><guid isPermaLink="true">https://www.jbbres.com/files/87602421014256fb495336082c04135b-26.html#unique-entry-id-26</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/run7_gallery__600x362.jpg" width="480" height="290" /><br /></p><p style="text-align:left;"><br />This year again, our team will run the City2Surf race and raise money for Doctors Without Borders/Medecins Sans Fronti&egrave;res!<br />Support our team by visiting our fundraising page <a href="http://www.fundraise.city2surf.com.au/jbbres" target="self" rel="external">http://www.fundraise.city2surf.com.au/jbbres</a> and by donating to a good cause<br /></p>]]></content:encoded></item><item><title>Yes&#x2c; we&#x27;re still there&#x21;</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2012-04-22T10:30:28+10:00</dc:date><link>https://www.jbbres.com/files/40b83fec35f09724da97723d97ecbea3-27.html#unique-entry-id-27</link><guid isPermaLink="true">https://www.jbbres.com/files/40b83fec35f09724da97723d97ecbea3-27.html#unique-entry-id-27</guid><content:encoded><![CDATA[Some of you have been wondering why there were not much news posted in the last months and if we were still working on Action(s).<br />Well, be reensure that we still are. We are currently working on Action(s) 1.2 that will bring you will a lot of new actions and functionalities.<br /><br />As you know, Action(s) is a free tool. Therefore we cannot work on it full time. We have another professional life. You know, the one that pays the bills. So depending on things are going, we are able to spend time on improving Action(s). And sometime it is more difficult. Lately, it has been more on the &laquo;&nbsp;difficult&nbsp;&raquo; part. Not much time. But hopefully, it will be better soon.<br /><br />Until then, do not hesitate to continue keep us posted with your ideas and comments, and we&rsquo;ll do our best to find time to improve Action(s) and make it even better!<br />]]></content:encoded></item><item><title>Action(s) 1.1.8 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-12-24T07:31:48+11:00</dc:date><link>https://www.jbbres.com/files/3396910bb5836f43d39301021e4fd535-28.html#unique-entry-id-28</link><guid isPermaLink="true">https://www.jbbres.com/files/3396910bb5836f43d39301021e4fd535-28.html#unique-entry-id-28</guid><content:encoded><![CDATA[Action(s) 1.1.8 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.8 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.8/1.1.8.html" target="self" title="Action(s) 1.1.8 - Release Notes" rel="external">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span></p>]]></content:encoded></item><item><title>Certificate for Action(s)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-12-22T21:34:23+11:00</dc:date><link>https://www.jbbres.com/files/adb704f5513c207122b02070a46dabc1-29.html#unique-entry-id-29</link><guid isPermaLink="true">https://www.jbbres.com/files/adb704f5513c207122b02070a46dabc1-29.html#unique-entry-id-29</guid><content:encoded><![CDATA[<strong><em>Updated: issue corrected in new version of Action(s) 1.1.8 - sorry for the inconvenience</em></strong><br /><br />Since a few days, some users might have a warning message displayed when launching Action(s):<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="expired-windows" src="https://www.jbbres.com/files/expired-windows.png" width="516" height="322" /><br /><br />or<br /><br /><img class="imageStyle" alt="expired-mac" src="https://www.jbbres.com/files/expired-mac.jpg" width="502" height="187" /><br /><br /></p><p style="text-align:left;">This is due to the fact that our current certificate has expired and is currently being renewed. It will be updated in a few days and the message will not appear anymore.<br /><br />In the meantime, we suggest useds to select the "<em>Allow trust content from this publishe</em>r" option or the "<em>Allow all applications from app.jbbres.com with this signature</em>" option and click on the "<strong><em>Run</em></strong>" or "<strong><em>Allow</em></strong>" button. <br /><br />Sorry for the inconvenience<br /><br /></p>]]></content:encoded></item><item><title>Triggering workflow on folder events</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-10-29T09:35:19+11:00</dc:date><link>https://www.jbbres.com/files/8591bade2ad0861081ddfd81b9dddb53-30.html#unique-entry-id-30</link><guid isPermaLink="true">https://www.jbbres.com/files/8591bade2ad0861081ddfd81b9dddb53-30.html#unique-entry-id-30</guid><content:encoded><![CDATA[Rengel published a very interresting article on how you can trigger the execution of an Action(s) workflow when an event occurs on a folder.<br /><br />Have a look at <a href="http://app.jbbres.com/forum/index.php?topic=236.msg430#new" target="self" rel="external">http://app.jbbres.com/forum/index.php?topic=236.msg430#new</a> for the full article.]]></content:encoded></item><item><title>Action(s) 1.1.7 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-10-28T22:36:23+11:00</dc:date><link>https://www.jbbres.com/files/b99aaeb4dbce9def2ad8904284d85942-31.html#unique-entry-id-31</link><guid isPermaLink="true">https://www.jbbres.com/files/b99aaeb4dbce9def2ad8904284d85942-31.html#unique-entry-id-31</guid><content:encoded><![CDATA[Action(s) 1.1.7 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.7 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.7/1.1.7.html" target="self" title="Action(s) 1.1.7 - Release Notes">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span></p>]]></content:encoded></item><item><title>Thank You Steve</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Posts</category><dc:date>2011-10-07T22:37:53+11:00</dc:date><link>https://www.jbbres.com/files/b50190c3a9bdd0f3fc15fedb40e0be28-32.html#unique-entry-id-32</link><guid isPermaLink="true">https://www.jbbres.com/files/b50190c3a9bdd0f3fc15fedb40e0be28-32.html#unique-entry-id-32</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Steve Jobs" src="https://www.jbbres.com/files/steve.jpg" width="480" height="308" /><br /><br />Thank You Steve,<br />None of that would have been possible without you.</p>]]></content:encoded></item><item><title>Action(s) 1.1.6 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-09-20T20:39:01+10:00</dc:date><link>https://www.jbbres.com/files/2afc1f6f4ee25f64ab3fcfcdb4fefe68-33.html#unique-entry-id-33</link><guid isPermaLink="true">https://www.jbbres.com/files/2afc1f6f4ee25f64ab3fcfcdb4fefe68-33.html#unique-entry-id-33</guid><content:encoded><![CDATA[Action(s) 1.1.6 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.6 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.6/1.1.6.html" target="self" title="Action(s) 1.1.6 - Release Notes" rel="external">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span><br /></p>]]></content:encoded></item><item><title>Mouse and Keyboard Pack updated</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-08-03T19:39:45+10:00</dc:date><link>https://www.jbbres.com/files/f6a023a21e48d50f7ba7b58e21aeb956-34.html#unique-entry-id-34</link><guid isPermaLink="true">https://www.jbbres.com/files/f6a023a21e48d50f7ba7b58e21aeb956-34.html#unique-entry-id-34</guid><content:encoded><![CDATA[Today we published a small update of the <a href="https://app.jbbres.com/actions/more/20100711002/index.html" target="self" title="20100711002" rel="external">Mouse and Keyboard pack</a> for Action(s) (1.1.6). It corrected a small bug with the move cusor action.<br />The update is recommended for all users using this pack.]]></content:encoded></item><item><title>Send a file via FTP and much more</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-06-11T10:40:49+10:00</dc:date><link>https://www.jbbres.com/files/1f67b70d1d458e58089fa54d06da4f7f-35.html#unique-entry-id-35</link><guid isPermaLink="true">https://www.jbbres.com/files/1f67b70d1d458e58089fa54d06da4f7f-35.html#unique-entry-id-35</guid><content:encoded><![CDATA[We are pleased to present the work of an independant developper that has decided to enrich the Action(s) experience by creating some additional actions!<br /><br /><a href="http://www.elder-sign.net/" target="self" rel="external">redwarp</a> has created a great collection of actions for Action(s), including some amazing feature such as:<br /><div class="image-right"><a href="(null)/(null)" target="self" title="20110611001"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/jbbres-qr-code.png" width="155" height="155" /></a></div><ul><li><strong>Send files via FTP</strong>. (yep, a lot of you have been waiting for this one since a very long time!)</li><li><strong>Convert a text into a QR code</strong> (you know, those <a href="http://en.wikipedia.org/wiki/QRcode" target="self" rel="external">square bar codes</a> that you find a little bit everywhere now)</li><li><strong>Produce the </strong><strong><a href="http://en.wikipedia.org/wiki/MD5" target="self" rel="external">MD5 hash</a></strong><strong> of a file</strong></li></ul><br />So do not hesitate and <a href="https://app.jbbres.com/actions/more/20110611001/20110611001.html" target="self" title="20110611001" rel="external">go download</a> this new collection!<br /><br />And if you too you want to create your own actions, remember, it is very easy. Simply visit our <a href="https://app.jbbres.com/actions/more/index.html" target="self" title="More actions" rel="external">More Actions</a> webpage for more information.<br />]]></content:encoded></item><item><title>app.jbbres.com is taking part in the City2Surf</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2011-06-09T19:41:55+10:00</dc:date><link>https://www.jbbres.com/files/edd259e989741bf1e059c3ef3bae6407-36.html#unique-entry-id-36</link><guid isPermaLink="true">https://www.jbbres.com/files/edd259e989741bf1e059c3ef3bae6407-36.html#unique-entry-id-36</guid><content:encoded><![CDATA[<div class="image-right"><a href="http://www.city2surf.com.au/" target="self" rel="external"><img class="imageStyle" alt="City2Surf" src="https://www.jbbres.com/files/c2svlockup.jpg" width="128" height="175" /></a></div>This year again, app.jbbres.com is taking part in the <a href="http://www.city2surf.com.au/" target="self" rel="external">2011 City2Surf</a> and will be participating to raise money for a cause we care about: <a href="http://www.msf.org.au/" target="self" rel="external">M&eacute;decins Sans Fronti&egrave;res Australia</a>. You can help me reach us fundraising goal by donating to this important cause! All you need to do is click the Donate Now button on <a href="http://www.fundraise.city2surf.com.au/Jeanbaptiste_Bres" target="self" rel="external">this page</a>, give what you can and if you want to, leave us a message of support.<br /><br />Visit <a href="http://www.fundraise.city2surf.com.au/Jeanbaptiste_Bres" target="self" rel="external">http://www.fundraise.city2surf.com.au/Jeanbaptiste_Bres</a> for more information.<br /><br /><strong>The 2011 Sun-Herald City2Surf, presented by Westpac for Medecins Sans Frontieres Australia</strong><br />M&eacute;decins Sans Fronti&egrave;res is the world's leading independent organisation for emergency medical humanitarian aid. We help victims of conflict, respond to chronic food shortages, epidemics and natural disasters. Every year M&eacute;decins Sans Fronti&egrave;res sends around 3,000 international field workers to work alongside 22,000 national staff in countries around the world. There they work together to bring emergency medical assistance to the people who need it most and may otherwise have no access to even the most basic life-saving health services.]]></content:encoded></item><item><title>New tutorial video: Using Variables in Action(s)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-06-03T20:43:06+10:00</dc:date><link>https://www.jbbres.com/files/f3fd5fb0646c9ea34d4324a15d16a649-37.html#unique-entry-id-37</link><guid isPermaLink="true">https://www.jbbres.com/files/f3fd5fb0646c9ea34d4324a15d16a649-37.html#unique-entry-id-37</guid><content:encoded><![CDATA[<script type="text/javascript" src="http://app.jbbres.com/videos/actions/variables/com/js/swfobject/swfobject.js"></script>		
		<script type="text/javascript">
			var flashvars = {};
			var params = {};
			
			params.bgcolor = "#000000";
			params.allowscriptaccess = "always";
			
			flashvars.videoPath = "http://app.jbbres.com/videos/actions/variables/movie.f4v";
			flashvars.posterPath = "http://app.jbbres.com/videos/actions/variables/com/poster/myPosterFrame.jpg";
			flashvars.skinPath = "http://app.jbbres.com/videos/actions/variables/com/skin/skin.swf";
			
			var stageW = 590;
			var stageH = 369;
			
			var attributes = {};
			attributes.id = "flashcontent";			
			
			swfobject.embedSWF("http://app.jbbres.com/videos/actions/variables/player.swf", "flashcontent", stageW, stageH, "9.0.0", false, flashvars, params, attributes);
		</script>
		<div id="flashcontent"><p>This video requires a more recent version of the Adobe Flash Player to display.  Please update your version of the <a href="http://www.adobe.com/go/getflashplayer">Adobe Flash Player</a>.</p></div>	]]></content:encoded></item><item><title>New tutorial video: Creating Loops with Action(s)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-05-22T17:43:51+10:00</dc:date><link>https://www.jbbres.com/files/b6d096d83871cb59a718cbeb6a3686af-38.html#unique-entry-id-38</link><guid isPermaLink="true">https://www.jbbres.com/files/b6d096d83871cb59a718cbeb6a3686af-38.html#unique-entry-id-38</guid><content:encoded><![CDATA[<script type="text/javascript" src="http://app.jbbres.com/videos/actions/loop/com/js/swfobject/swfobject.js"></script>		
		<script type="text/javascript">
			var flashvars = {};
			var params = {};
			
			params.bgcolor = "#000000";
			params.allowscriptaccess = "always";
			
			flashvars.videoPath = "http://app.jbbres.com/videos/actions/loop/movie.f4v";
			flashvars.posterPath = "http://app.jbbres.com/videos/actions/loop/com/poster/myPosterFrame.jpg";
			flashvars.skinPath = "http://app.jbbres.com/videos/actions/loop/com/skin/skin.swf";
			
			var stageW = 590;
			var stageH = 369;
			
			var attributes = {};
			attributes.id = "flashcontent";			
			
			swfobject.embedSWF("http://app.jbbres.com/videos/actions/loop/player.swf", "flashcontent", stageW, stageH, "9.0.0", false, flashvars, params, attributes);
		</script>
		<div id="flashcontent"><p>This video requires a more recent version of the Adobe Flash Player to display.  Please update your version of the <a href="http://www.adobe.com/go/getflashplayer">Adobe Flash Player</a>.</p></div>	]]></content:encoded></item><item><title>Action(s) is on Serbian TV</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-05-19T17:45:55+10:00</dc:date><link>https://www.jbbres.com/files/204aee35d3a9cedfa750d2a250792c30-39.html#unique-entry-id-39</link><guid isPermaLink="true">https://www.jbbres.com/files/204aee35d3a9cedfa750d2a250792c30-39.html#unique-entry-id-39</guid><content:encoded><![CDATA[Action(s) got the honors of the Serbian TV in the <strong>Interfejs</strong> [Interfaces] TV program.<br />Interfejs is one of the most popular program on Serbian TV, with 400.000 viewers every week, so we are very proud that they decided to present our application in their show:<br /><code><embed src="http://blip.tv/play/AYK4%2BiwC" type="application/x-shockwave-flash" width="480" height="350" allowscriptaccess="always" allowfullscreen="true"></embed></code>
<br />If, like me, you unfortunatelly do not understand Serbian, you can still discover the content of the article in English with <a href="http://translate.google.com/translate?hl=fr&sl=auto&tl=en&u=http%3A%2F%2Fwww.interfejs.tv%2Fprilog.php%3FID%3D11916" target="self" rel="external">Google Translate</a>.<br /><br />At app.jbbres.com, we found their introduction very interresting as it reflects exactly what we have been trying to achieve with Action(s):<br /><br /><blockquote><p>If you ask customers what is the most important thing that has changed with the usage of computers, we believe that in many cases the answer will be: "Now it is possible to do many tasks and routines much faster and with more efficiently than before." A statement with which we entirely agree. Nevertheless, the degree of automation depends on the capabilities of your tools. If you have to perform a set of actions and steps, and nobody has ever written a program with such a purpose, you&rsquo;re left with not some many solutions. </p></blockquote>

]]></content:encoded></item><item><title>Action(s) 1.1.5 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-04-01T20:46:51+11:00</dc:date><link>https://www.jbbres.com/files/819ffc1fcac4059dc22fd3e49284b298-40.html#unique-entry-id-40</link><guid isPermaLink="true">https://www.jbbres.com/files/819ffc1fcac4059dc22fd3e49284b298-40.html#unique-entry-id-40</guid><content:encoded><![CDATA[Action(s) 1.1.5 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.5 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.5/1.1.5.html" target="self" title="Action(s) 1.1.5 - Release Notes - copie" rel="external">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span><br /></p>]]></content:encoded></item><item><title>Action(s) 1.1.4 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-03-30T21:47:46+11:00</dc:date><link>https://www.jbbres.com/files/511c82424512ceaf413275d621a674a1-41.html#unique-entry-id-41</link><guid isPermaLink="true">https://www.jbbres.com/files/511c82424512ceaf413275d621a674a1-41.html#unique-entry-id-41</guid><content:encoded><![CDATA[Action(s) 1.1.4 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.4 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.4/1.1.4.html" target="self" title="Action(s) 1.1.4 - Release Notes" rel="external">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span><br /></p>]]></content:encoded></item><item><title>More Internet Actions</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-03-20T12:49:01+11:00</dc:date><link>https://www.jbbres.com/files/4b2d1c7ca81d2af8b6bb6fda84c022e2-42.html#unique-entry-id-42</link><guid isPermaLink="true">https://www.jbbres.com/files/4b2d1c7ca81d2af8b6bb6fda84c022e2-42.html#unique-entry-id-42</guid><content:encoded><![CDATA[Today we are proud to announce a new set of actions available from the <a href="https://app.jbbres.com/actions/more/index.html" target="self" title="More actions" rel="external">More Actions</a> website:<br />The <a href="https://app.jbbres.com/actions/more/20110320001/index.html" target="self" title="20110320001" rel="external">Additional Internet Actions Pack</a> offers a brain new action, <em>Get icon URLs from Webpage</em>, that allow you to download the favicons of a website. This action event manages the website icon for Apple iOS devices (iPhone, iPad) if any. <br /><br />Thanks to Enzyme for the idea.]]></content:encoded></item><item><title>Tips &#x26; Tricks: File Renaming and Date Format</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-03-05T08:49:56+11:00</dc:date><link>https://www.jbbres.com/files/d1025afdd0f543573f9480f9f759c000-43.html#unique-entry-id-43</link><guid isPermaLink="true">https://www.jbbres.com/files/d1025afdd0f543573f9480f9f759c000-43.html#unique-entry-id-43</guid><content:encoded><![CDATA[One of the great actions that Action(s) provides is the <em>Rename Files</em> action.<br /><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/rename-file.jpg" width="462" height="164" /><br /></p><p style="text-align:left;">Especially, using the <em>add date</em> mode, you can add a date to the file name using various date formats. By default,  <em>Rename Files</em> provides 7 formats:<br /><br /><table border=1 cellspacing=0 cellpadding=3>
<tr>
         <th align=left>Date and Time Format
         <th align=left>Example
<tr>
         <td><code>dd MMMMM yyyy</code>
         <td><code>29 March 2011</code>
<tr>
         <td><code>dd-MM-yy</code>
         <td><code>29-03-11</code>
<tr>
         <td><code>MM-dd-yy</code>
         <td><code>03-29-11</code>
<tr>
         <td><code>yyyyMMdd</code>
         <td><code>20110329</code>
<tr>
         <td><code>dd-MM-yy hh.mm.ss</code>
         <td><code>29-03-11 17.42.12</code>
<tr>
         <td><code>h.mm a</code>
         <td><code>5.42 pm</code>
<tr>
         <td><code>hh.mm</code>
         <td><code>17.42</code>
</table><br /><br />But you can also create your own format if the ones provided does not answer your need. It is very easy. Action(s) interprets different letters as date and time codes and replaces them by their values. You can combine the codes to create your own format.<br />Here are the available iddentifiers:<br /><br /><table border=1 cellspacing=0 cellpadding=3>
     <tr>
         <th align=left>Code
         <th align=left>Date or Time Component
         <th align=left>Examples
     <tr>
         <td><code>G</code>
         <td>Era designator
         <td><code>AD</code>
     <tr>
         <td><code>yy</code>
         <td>Year (2 digits)
         <td><code>96</code>
     <tr>
         <td><code>yyyy</code>
         <td>Year (4 digits)
         <td><code>1996</code>
     <tr>
         <td><code>MM</code>
         <td>Month in year (2 digits)
         <td><code>07</code>
     <tr>
         <td><code>MMM</code>
         <td>Month in year (3 letters)
         <td><code>Jul</code>
     <tr>
         <td><code>MMMM</code>
         <td>Month in year (full)
         <td><code>July</code>
     <tr>
         <td><code>w</code>
         <td>Week in year
         <td><code>27</code>
     <tr>
         <td><code>W</code>
         <td>Week in month
         <td><code>2</code>
     <tr>
         <td><code>D</code>
         <td>Day in year
         <td><code>189</code>
     <tr>
         <td><code>d</code>
         <td>Day in month (1 or 2 digits)
         <td><code>5</code> ; <code>23</code>
     <tr>
         <td><code>dd</code>
         <td>Day in month (2 digits)
         <td><code>05</code> ; <code>23</code>
     <tr>
         <td><code>F</code>
         <td>Day of week in month
         <td><code>2</code>
     <tr>
         <td><code>EEE</code>
         <td>Day in week (3 letters)
         <td><code>Tue</code>
     <tr>
         <td><code>EEEE</code>
         <td>Day in week (full)
         <td><code>Tuesday</code>
     <tr>
         <td><code>a</code>
         <td>Am/pm marker
         <td><code>PM</code>
     <tr>
         <td><code>H</code>
         <td>Hour in day (0-23) (1 or 2 digits)
         <td><code>0</code> ; <code>14</code>
     <tr>
         <td><code>HH</code>
         <td>Hour in day (0-23) (2 digits)
         <td><code>00</code> ; <code>14</code>
     <tr>
         <td><code>h</code>
         <td>Hour in am/pm (1-12)  (1 or 2 digits)
         <td><code>12</code> ;  <code>3</code>
     <tr>
         <td><code>hh</code>
         <td>Hour in am/pm (1-12)  (2 digits)
         <td><code>12</code> ;  <code>03</code>
     <tr>
         <td><code>k</code>
         <td>Hour in day (1-24)  (1 or 2 digits)
         <td><code>24</code> ; <code>3</code>
<tr>
         <td><code>kk</code>
         <td>Hour in day (1-24)  (2 digits)
         <td><code>24</code> ; <code>03</code>
     <tr>
         <td><code>K</code>  
         <td>Hour in am/pm (0-11) (1 or 2 digits)
         <td><code>0</code> ;  <code>11</code>
     <tr>
         <td><code>K</code>  
         <td>Hour in am/pm (0-11) (2 digits)
         <td><code>00</code> ;  <code>11</code>
     <tr>
         <td><code>m</code>
         <td>Minute in hour (1 or 2 digits)
         <td><code>30</code> ; <code>5</code>
     <tr>
         <td><code>mm</code>
         <td>Minute in hour (2 digits)
         <td><code>30</code> ; <code>05</code>
     <tr>
         <td><code>s</code>
         <td>Second in minute (1 or 2 digits)
         <td><code>55</code> ; <code>8</code>
     <tr>
         <td><code>ss</code>
         <td>Second in minute (2 digits)
         <td><code>55</code> ; <code>08</code>
     <tr>
         <td><code>S</code>
         <td>Millisecond (1, 2 or 3 digits)
         <td><code>978</code> ; <code>78</code> ; <code>9</code>
     <tr>
         <td><code>SSS</code>
         <td>Millisecond (3 digits)
         <td><code>978</code> ; <code>078</code> ; <code>009</code>
     <tr>
         <td><code>zzz</code>
         <td>Time zone (short name if available or GMT based)
         <td><code>PST</code> ; <code>GMT-08:00</code>
     <tr>
         <td><code>zzzz</code>
         <td>Time zone (full name if available or GMT based)
         <td><code>Pacific Standard Time</code> ; <code>GMT-08:00</code>
     <tr>
         <td><code>Z</code>
         <td>Time zone (<a href="http://tools.ietf.org/html/rfc822" target="new">RFC 822 format</a>)
         <td><code>-0800</code>
 </table><br /><br />Text can be quoted using single quotes (<code>'</code>) to avoid interpretation. <code>''</code> (2 quotes) represents a single quote. <br />All characters which are not letters (from <code>'A'</code> to <code>'Z'</code> and from <code>'a'</code> to <code>'z'</code>) are not interpreted and so do not need to be put between quotes.<br /><br />The following examples show how date and time patterns are interpreted in the U.S. locale. The given date and time are 4 July 2001 at 12:08:56 local time in the U.S. Pacific Time time zone.<br /><br /> <table border=1 cellspacing=0 cellpadding=3>
     <tr>
         <th align=left>Date and Time Format
         <th align=left>Result
     <tr>
         <td><code>yyyy.MM.dd G 'at' HH:mm:ss z</code>
         <td><code>2001.07.04 AD at 12:08:56 PDT</code>
     <tr>
         <td><code>EEE, MMM d, ''yy</code>
         <td><code>Wed, Jul 4, '01</code>
     <tr>
         <td><code>h:mm a</code>
         <td><code>12:08 PM</code>
     <tr>
         <td><code>hh 'o''clock' a, zzzz</code>
         <td><code>12 o'clock PM, Pacific Daylight Time</code>
     <tr>
         <td><code>K:mm a, z</code>
         <td><code>0:08 PM, PDT</code>
     <tr>
         <td><code>yyyy.MMMM.dd GGG hh:mm aaa</code>
         <td><code>2001.July.04 AD 12:08 PM</code>
     <tr>
         <td><code>EEE, d MMM yyyy HH:mm:ss Z</code>
         <td><code>Wed, 4 Jul 2001 12:08:56 -0700</code>
     <tr>
         <td><code>yyMMddHHmmssZ</code>
         <td><code>010704120856-0700</code>
 </table><br /> <br /></p>]]></content:encoded></item><item><title>Using Action(s) with your iPhone</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-02-27T09:50:54+11:00</dc:date><link>https://www.jbbres.com/files/5746bdd141457c351d3a5a347d2cf025-44.html#unique-entry-id-44</link><guid isPermaLink="true">https://www.jbbres.com/files/5746bdd141457c351d3a5a347d2cf025-44.html#unique-entry-id-44</guid><content:encoded><![CDATA[Enzyme, one of the most active member of our forum, has published on his <a href="http://enzyme-play.blogspot.com/" target="self" rel="external">blog</a> a tutorial showing how you can use Action(s) with <a href="http://www.dropbox.com/" target="self" rel="external">DropBox</a> and your iPhone. Its shows how you can very easily apply effects on pictures taken from your iPhone.<br />Have a look, it will for sure give you some ideas!<br /><br /><strong>iPhone and DropBox hack: WATCH and EXECUTE</strong><br /><a href="http://enzyme-play.blogspot.com/2011/02/iphone-and-dropbox-hack-watch-and.html" target="self" rel="external">http://enzyme-play.blogspot.com/2011/02/iphone-and-dropbox-hack-watch-and.html</a><br /><br /><iframe title="YouTube video player" width="480" height="390" src="http://www.youtube.com/embed/BhOS7GkCjfs" frameborder="0" allowfullscreen></iframe>]]></content:encoded></item><item><title>Action(s) 1.1.3 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-02-27T09:20:23+11:00</dc:date><link>https://www.jbbres.com/files/6e366a32a3e95fecc9414b70e6d824d8-67.html#unique-entry-id-67</link><guid isPermaLink="true">https://www.jbbres.com/files/6e366a32a3e95fecc9414b70e6d824d8-67.html#unique-entry-id-67</guid><content:encoded><![CDATA[Action(s) 1.1.3 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Action(s) 1.1.3 contains minor bug corrections. Find all the details regarding this release in the <a href="https://app.jbbres.com/actions/about/1.1.3/1.1.3.html" target="self" title="Action(s) 1.1.2 - Release Notes" rel="external">release notes page</a>.<br /><span style="font-size:11px; "><em><br /></em></span><br /></p>]]></content:encoded></item><item><title>You asked&#x2c; we listened: Action(s) 1.1 available</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-02-12T11:19:32+11:00</dc:date><link>https://www.jbbres.com/files/ef1ac7657253a3aa2e7c67f657157be3-66.html#unique-entry-id-66</link><guid isPermaLink="true">https://www.jbbres.com/files/ef1ac7657253a3aa2e7c67f657157be3-66.html#unique-entry-id-66</guid><content:encoded><![CDATA[Action(s) 1.1 is now available for download.<br /><br />The update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /><br /></p><p style="text-align:left;">You asked, we listened: Action(s) 1.1 contains next to a <strong>100 new functionalities</strong>, improvements and bug corrections, including:<br /><ul class="disc"><li>9 new actions to efficiently manage <strong>email messages</strong>. Compatible with <strong>Gmail</strong>, <strong>Yahoo! Mail</strong>, <strong>Live Mail</strong> and more.</li><li>3 new actions to improve the dynamic of your workflows: <strong>Condition</strong>, <strong>Loop</strong> and <strong>Dispense items incrementally</strong>.</li><li>Execute <strong>scripts</strong> within your workflow, using <strong>JavaScript</strong> or <strong>AppleScript</strong>*.</li><li><strong>Variable edition</strong></li><li>Improved <strong>security</strong>. Application signed with a 2048 bit certificate.</li></ul><br />Find all the details of this new release at <a href="(null)/(null)" target="self" title="Action(s) 1.1">http://app.jbbres.com/actions/about/1.1/1.1.html </a><br /><br />In the coming weeks, we will come with even more new stuffs, so stay tune!<br /><br /><span style="font-size:11px; "><em>*AppleScript requires Mac OS X.</em></span><br /><span style="font-size:11px; "><em><br /></em></span><span style="font-size:11px; "><br /></span></p>]]></content:encoded></item><item><title>Action(s) 1.1 Release Candidate available now&#x21;</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2011-01-21T20:18:55+11:00</dc:date><link>https://www.jbbres.com/files/da5b00f59bac2b6e9f28c6f8d89e9e64-65.html#unique-entry-id-65</link><guid isPermaLink="true">https://www.jbbres.com/files/da5b00f59bac2b6e9f28c6f8d89e9e64-65.html#unique-entry-id-65</guid><content:encoded><![CDATA[Today, we are very happy to make available a release candidate for Action(s) 1.1. Version 1.1 has been in the works for a long time and we decided to make a release candidate available before we make the final release, so you get the chance of giving us your feedback about it.<br /><br />Release Candidate (RC) refers to a version with potential to be a final product, ready to release unless fatal bugs emerge. In this stage of product stabilization, all product features have been designed, coded and tested through one or more beta cycles with no known showstopper-class bug. <br /><br />Click on the Launch button to try Action(s) 1.1 release candidate:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url ="http://app.jbbres.com/jws/beta/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">So what&rsquo;s new in version 1.1? Well, it contains next to a <strong>100 new functionalities</strong>, improvements and bug corrections, including:<br /><ul class="disc"><li>9 new actions to efficiently manage <strong>email messages</strong>. Compatible with <strong>Gmail</strong>, <strong>Yahoo! Mail</strong>, <strong>Live Mail</strong> and more.</li><li>3 new actions to improve the dynamic of your workflows: <strong>Condition</strong>, <strong>Loop</strong> and <strong>Dispense items incrementally</strong>.</li><li>Execute <strong>scripts</strong> within your workflow, using <strong>JavaScript</strong> or <strong>AppleScript</strong>*.</li><li><strong>Variable edition</strong></li><li>Improved <strong>security</strong>. Application signed with a 2048 bit certificate.</li></ul><br />Find all the details of this new release at <a href="(null)/(null)" target="self" title="Release Notes">http://app.jbbres.com/actions/about/1.1/rn/rn.html </a><br /><br />During the next two weeks, you will be able to try this new release, while we will be performing additional tests to ensure the quality before the official release of version 1.1.<br /><br />More info at <a href="blog/index.html" target="self" title="beta">http://app.jbbres.com/actions/beta/beta.html</a><br /><br /><span style="font-size:11px; "><em>*AppleScript requires Mac OS X.</em></span><br /></p>]]></content:encoded></item><item><title>Happy New Year 2011</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2011-01-11T22:18:01+11:00</dc:date><link>https://www.jbbres.com/files/a25313f2b80ac4e50efa5881bbfc4335-64.html#unique-entry-id-64</link><guid isPermaLink="true">https://www.jbbres.com/files/a25313f2b80ac4e50efa5881bbfc4335-64.html#unique-entry-id-64</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/2011.png" width="593" height="364" /></p>]]></content:encoded></item><item><title>Happy Holidays</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2010-12-18T17:17:19+11:00</dc:date><link>https://www.jbbres.com/files/5edb00bedc36c2402be87ba4a1bb21e3-63.html#unique-entry-id-63</link><guid isPermaLink="true">https://www.jbbres.com/files/5edb00bedc36c2402be87ba4a1bb21e3-63.html#unique-entry-id-63</guid><content:encoded><![CDATA[<div class="image-left"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/avatar---xmas.png" width="198" height="255" /></div><span style="font-size:14px; color:#CC0000;font-weight:bold; ">Happy Holidays from app.jbbres.com</span><br /><br />2010 is almost over... Get ready as 2011 will be the year of Action(s). For a starter, a brand new version of Action(s) will be available in the first weeks of the year with new features and new actions. <br /><br />Until them, have all a very mery Christmas, and see you all in 2011.<br /><br />]]></content:encoded></item><item><title>Action(s)&#x2c; as seen on TV</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-11-19T18:15:31+11:00</dc:date><link>https://www.jbbres.com/files/ae955a718d26b81637ef25f9eab084ef-62.html#unique-entry-id-62</link><guid isPermaLink="true">https://www.jbbres.com/files/ae955a718d26b81637ef25f9eab084ef-62.html#unique-entry-id-62</guid><content:encoded><![CDATA[Action(s) is on French TV<br /><br /><center><OBJECT CLASSID="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" 
CODEBASE="http://www.apple.com/qtactivex/qtplugin.cab" WIDTH="320" HEIGHT="240" >
<PARAM NAME="src" VALUE="http://podcast13.streamakaci.com/videos/mp4/funkyweb-101110.mp4" >
<PARAM NAME="autoplay" VALUE="true" >
<EMBED SRC="http://podcast13.streamakaci.com/videos/mp4/funkyweb-101110.mp4" TYPE="image/x-macpaint" 
PLUGINSPAGE="http://www.apple.com/quicktime/download" WIDTH="320" HEIGHT="240" AUTOPLAY="false"></EMBED>
</OBJECT></center><br />source: <a href="http://www.gameone.net/emissions-series-articles/Funky-Web-Mecredi-10-novembre-1803/FUNKY-WEB-27/mon-game-one-MAGAZINES" target="self" rel="external">GameOne</a><br />]]></content:encoded></item><item><title>&#xd83d;&#xdca1; The Robot&#x2c; the Apple and the Coffee Bean</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><category>Action(s)</category><category>Articles</category><dc:date>2010-11-09T19:52:06+11:00</dc:date><link>https://www.jbbres.com/files/a4045778384a7ed766e01d1605e1aa2a-45.html#unique-entry-id-45</link><guid isPermaLink="true">https://www.jbbres.com/files/a4045778384a7ed766e01d1605e1aa2a-45.html#unique-entry-id-45</guid><content:encoded><![CDATA[<p style="text-align:center;"><img class="imageStyle" alt="Article" src="https://www.jbbres.com/files/article.png" width="209" height="61" /><br /></p><p style="text-align:left;">For a change, let&rsquo;s talk about technologies&hellip; <br />Have you heard about Java? No? Well, even if you don&rsquo;t know it, you are probably using Java everyday: On your computer, your mobile phone, your TV and more. Action(s) is made with Java, and it is the reason why you can run it indifferently on Windows, Linux or Mac OS X.<br /><br />Apple made recently two big announcements regarding Java:<br /><ul class="disc"><li>The creation of a Mac App Store where Java applications will not be accepted</li><li>The end of Apple&rsquo;s support of Java on Mac OS X </li></ul><br />The question that a lot of you have been asking us is: <strong>will these announcements impact the existence of Action(s) on the Mac OS platform?</strong><br />The answer is <strong>No</strong>. We are still very committed to the Mac OS platform. We do not believe that Java will disappear from Mac OS X and we will continue to provide a high-quality &ndash; fully integrated version of Action(s) for Mac users.<br /></p>]]></content:encoded></item><item><title>Help us to make Action(s) better</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-11-06T13:14:44+11:00</dc:date><link>https://www.jbbres.com/files/20bc18dffd81f3805cea1758cbd405f0-61.html#unique-entry-id-61</link><guid isPermaLink="true">https://www.jbbres.com/files/20bc18dffd81f3805cea1758cbd405f0-61.html#unique-entry-id-61</guid><content:encoded><![CDATA[ Action(s) is free to download and use, but it still costs money to write, support, and distribute. <br /><br />This is why we are opening today a donation program. Donations are used towards hosting costs for this website, licences and hardware, and also encourage further development! That way, you can donate if you think that Action(s) worth it.<br /><br />You can do your donation via PayPal. To donate, click the button below and you will be directed to the Paypal site. Donations are taken in US$, but if you have an account in any other currency, PayPal will automatically convert the sum for you. <br /><br /><center><form action="https://www.paypal.com/cgi-bin/webscr" method="post">
<input type="hidden" name="cmd" value="_s-xclick">
<input type="hidden" name="hosted_button_id" value="9H5PYG2ZE2PRQ">
<input type="image" src="https://www.paypal.com/en_US/i/btn/btn_donateCC_LG_global.gif" border="0" name="submit" alt="PayPal - The safer, easier way to pay online.">
<img alt="" border="0" src="https://www.paypal.com/en_AU/i/scr/pixel.gif" width="1" height="1">
</form></center>
<br />Thanks for your support and your help,<br /><br />app.jbbres.com team]]></content:encoded></item><item><title>Convert to JPEG</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-10-31T09:13:54+11:00</dc:date><link>https://www.jbbres.com/files/3768cfcc21d21d3fe1c35a90820ff2b8-60.html#unique-entry-id-60</link><guid isPermaLink="true">https://www.jbbres.com/files/3768cfcc21d21d3fe1c35a90820ff2b8-60.html#unique-entry-id-60</guid><content:encoded><![CDATA[Today we are introducing a brain new action: <strong><a href="https://app.jbbres.com/actions/more/20101031001/index.html" target="self" title="20101031001" rel="external">Convert to JPEG</a></strong>.<br />If you are using Action(s) to work on your pictures you probably know that Action(s) is providing by default an action to change the type of image. It allows you to easily convert any picture, whatever its format is, to another format, including JPEG.<br />For most of us, this action is just what we need: easy to use and easy to configure. But if you are an advance user, you for sure have noticed that "Change the Type of Image" apply a default quality rate to the JPEG pictures it creates (usually 80%), and you might want to be able to define a quality rate that fit your needs.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="Convert to JPEG" src="https://www.jbbres.com/files/pasted-image-1.png" width="500" height="109" /><br /></p><p style="text-align:left;"><br />The <strong><a href="https://app.jbbres.com/actions/more/20101031001/index.html" target="self" title="20101031001" rel="external">Convert to JPEG</a></strong> action is for you. It converts any picture into a JPEG file with the quality rate indicated. Download it right now from the <a href="https://app.jbbres.com/actions/more/index.html" target="self" title="More actions" rel="external">More Actions</a> webpage or by clicking on "<strong>Get more actions...</strong>" in the "<strong>Help</strong>" menu of Action(s).<br /></p>]]></content:encoded></item><item><title>A new video tutorial from Lifehacker.com</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-10-22T22:09:58+11:00</dc:date><link>https://www.jbbres.com/files/b022c317119108cf2562893905d1c3e1-59.html#unique-entry-id-59</link><guid isPermaLink="true">https://www.jbbres.com/files/b022c317119108cf2562893905d1c3e1-59.html#unique-entry-id-59</guid><content:encoded><![CDATA[If you are a beginner with Action(s), this is for you! <br />The excellent <a href="http://www.lifehacker.com" target="self" rel="external">LifeHacker.com</a> website has published a very well done tutorial of Action(s) today, with video demonstration and advises. <br /><br /><object width="560" height="340"><param name="movie" value="http://www.youtube.com/v/tf80sF3_0L4?fs=1&amp;hl=en_US&amp;rel=0&amp;hd=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/tf80sF3_0L4?fs=1&amp;hl=en_US&amp;rel=0&amp;hd=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="560" height="340"></embed></object><br /><br />Read the article at: <a href="http://lifehacker.com/5669762/automate-just-about-anything-on-your-windows-pc-no-coding-required" target="self" rel="external">http://lifehacker.com/5669762/automate-just-about-anything-on-your-windows-pc-no-coding-required</a>]]></content:encoded></item><item><title>Action(s) 1.0.1 released</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-10-20T21:09:14+11:00</dc:date><link>https://www.jbbres.com/files/6a8e5b64dd9ea59c4deccb994f3b5a5a-58.html#unique-entry-id-58</link><guid isPermaLink="true">https://www.jbbres.com/files/6a8e5b64dd9ea59c4deccb994f3b5a5a-58.html#unique-entry-id-58</guid><content:encoded><![CDATA[Action(s) 1.0.1 is now available for download.<br /><br />the update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><hr /><br /></p><p style="text-align:left;"><span style="font-size:11px; "><em>Action(s) 1.0.1 release content:</em></span><span style="font-size:11px; "><br /></span><ul class="disc"><li><span style="font-size:11px; ">"Copy file" action: Now prevent from coping a folder into itself or one of its sub-folders. Prior to this release, Action(s) was generating an infinite number of sub-folders within the destination folder.</span></li><li><span style="font-size:11px; ">"Get URL" action: Selected lines backgrounds were white instead of using the system colors.</span></li><li><span style="font-size:11px; ">"Show notification in tray bar" action: Mac OS X - The notification windows is now using the system colors.</span></li><li><span style="font-size:11px; ">Variable selection combo box: Selected lines backgrounds were white instead of using the system colors.</span></li><li><span style="font-size:11px; ">Some actions were displaying an incorrect version number (1.1 instead of 1.0.1)</span></li><li><span style="font-size:11px; ">"Split files" additional actions: An error message was displayed when adding one of the actions in the workflow. Users of the "Split files" additional actions can download the latest version at </span><span style="font-size:11px; "><a href="http://app.jbbres.com/actions/more" target="self">http://app.jbbres.com/actions/more</a></span></li><li><span style="font-size:11px; ">Action(s) plug-in folder now support jar file as well as actc files</span></li><li><span style="font-size:11px; ">New version of the Action(s) API (v1.0.1) available. Users of the API can download the latest version at </span><span style="font-size:11px; "><a href="http://app.jbbres.com/developers/libraries/actions/" target="self">http://app.jbbres.com/developers/libraries/actions/</a></span></li></ul><br /></p>]]></content:encoded></item><item><title>FreewareGenuis pick</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-10-18T21:08:07+11:00</dc:date><link>https://www.jbbres.com/files/e6cf17dadd122fd45bc3e701b28d4f34-57.html#unique-entry-id-57</link><guid isPermaLink="true">https://www.jbbres.com/files/e6cf17dadd122fd45bc3e701b28d4f34-57.html#unique-entry-id-57</guid><content:encoded><![CDATA[<p style="text-align:center;"><a href="http://www.freewaregenius.com/2010/10/13/actions-automate-all-kinds-of-tasks-via-drag-and-drop-without-writing-a-line-of-code" target="self" rel="external"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/fw-seal-small.gif" width="150" height="38" /></a><br /><br /></p><p style="text-align:left;">Action(s) has been selected freewaregenuis pick by the famous <a href="http://www.freewaregenuis.com" target="self" rel="external">freewaregenuis.com</a> blog. As we are reading this website since a long time at app.jbbres.com, and loving what these guys are doing, you can imagine that this has been a great surprise for all of us.<br /><br />A few selected lines:<br />&laquo;&nbsp;<em>The range of options that Actions supports, I will say, is truly impressive</em>&nbsp;&raquo;<br />&laquo;&nbsp;<em>What can this program do for you? Most anything you can think of.</em>&nbsp;&raquo;<br />&laquo;&nbsp;<em>Very user friendly and goes a long way towards making this application accessible and easy to learn</em>&nbsp;&raquo;<br />&laquo;&nbsp;<em>There&rsquo;s no syntax to learn and no libraries or functions to deal with; the experience is closer to building a Lego than writing code.</em>&nbsp;&raquo;<br />And my personal favorite :D: &laquo;&nbsp;<em>I&rsquo;ve been playing with this software for a couple of days and I just love it. The developers have done an astounding job making this software both powerful and accessible.</em>&nbsp;&raquo;<br /><br />Read the full article at <a href="http://www.freewaregenius.com/2010/10/13/actions-automate-all-kinds-of-tasks-via-drag-and-drop-without-writing-a-line-of-code" target="self" rel="external">http://www.freewaregenius.com/2010/10/13/actions-automate-all-kinds-of-tasks-via-drag-and-drop-without-writing-a-line-of-code</a>.</p>]]></content:encoded></item><item><title>Action(s) turns 1</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-10-01T13:07:27+10:00</dc:date><link>https://www.jbbres.com/files/2656d6a554464c1c1c66c42d68e0c342-56.html#unique-entry-id-56</link><guid isPermaLink="true">https://www.jbbres.com/files/2656d6a554464c1c1c66c42d68e0c342-56.html#unique-entry-id-56</guid><content:encoded><![CDATA[It&rsquo;s a double one for Action(s) today:<br />First, Action(s) turns one this month. Even if most of you know Action(s) only since June (when we released the first public beta), we started working on Action(s) in September 2009. Already one year ago.<br />And the second one is the official release of Action(s) 1.0 today. From now on, no more beta! We are officially live!<br /><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/action0028s0029-one.png" width="256" height="256" /><br /><br /></p><p style="text-align:left;">If you were already using the beta or release candidate version of Action(s), the update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center></p><p style="text-align:center;"><br /><br /></p>]]></content:encoded></item><item><title>A Video Introduction to Action(s)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-09-05T21:06:46+10:00</dc:date><link>https://www.jbbres.com/files/b03b5a75cf26bfe3326d1698dbb1cb01-55.html#unique-entry-id-55</link><guid isPermaLink="true">https://www.jbbres.com/files/b03b5a75cf26bfe3326d1698dbb1cb01-55.html#unique-entry-id-55</guid><content:encoded><![CDATA[<script type="text/javascript" src="http://app.jbbres.com/videos/actions/101/com/js/swfobject/swfobject.js"></script>		
		<script type="text/javascript">
			var flashvars = {};
			var params = {};
			
			params.bgcolor = "#000000";
			params.allowscriptaccess = "always";
			
			flashvars.videoPath = "http://app.jbbres.com/videos/actions/101/movie.f4v";
			flashvars.posterPath = "http://app.jbbres.com/videos/actions/101/com/poster/myPosterFrame.jpg";
			flashvars.skinPath = "http://app.jbbres.com/videos/actions/101/com/skin/skin.swf";
			
			var stageW = 590;
			var stageH = 369;
			
			var attributes = {};
			attributes.id = "flashcontent";			
			
			swfobject.embedSWF("http://app.jbbres.com/videos/actions/101/player.swf", "flashcontent", stageW, stageH, "9.0.0", false, flashvars, params, attributes);
		</script>
		<div id="flashcontent"><p>This video requires a more recent version of the Adobe Flash Player to display.  Please update your version of the <a href="http://www.adobe.com/go/getflashplayer">Adobe Flash Player</a>.</p></div>]]></content:encoded></item><item><title>Last Stop before the Big 1</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-08-25T20:05:58+10:00</dc:date><link>https://www.jbbres.com/files/18ca9e0111cde723448bae8cf743c96d-54.html#unique-entry-id-54</link><guid isPermaLink="true">https://www.jbbres.com/files/18ca9e0111cde723448bae8cf743c96d-54.html#unique-entry-id-54</guid><content:encoded><![CDATA[It has been almost a month since we haven&rsquo;t post anything on the blog. Well, it&rsquo;s always like that in summer, everything is a little bit slow... (note: this is a bad excuse: we are located in Sydney, Australia and it isn&rsquo;t summer here...).<br /><br />Anyway, we are publishing today a new version of Action(s). You will spot immediatly what this version brings:<br /><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/pasted-graphic.jpg" width="274" height="138" /><br /></p><p style="text-align:left;">Yep, you can now search the library of actions. That&rsquo;s a very useful function, so we hope you will like it.<br /><br />Plus, this version is tagged RC. This means that, except for major issue, this will be the last version before the final 1.0. We are very excited about that!<br /><br />So, as always, the update will download automatically next time you will start Action(s) from your desktop or by clicking on this the launch button below:<br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center></p>]]></content:encoded></item><item><title>A good action</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Other</category><dc:date>2010-07-25T21:05:24+10:00</dc:date><link>https://www.jbbres.com/files/211a8ee9b55cfcd5c064c5b1eecce789-53.html#unique-entry-id-53</link><guid isPermaLink="true">https://www.jbbres.com/files/211a8ee9b55cfcd5c064c5b1eecce789-53.html#unique-entry-id-53</guid><content:encoded><![CDATA[This year, the app.jbbres.com team is running the 14km Sun-Herald City2Surf presented by Westpac for a cause we care about: M&eacute;decins Sans Fronti&egrave;res. <br /><br />If you can, please support us by donating what you can on our fundraising page. <br /><a href="(null)/(null)" target="self" title="city2surf2010">Click here for more information</a>.<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/run7_gallery__600x362.jpg" width="600" height="362" /></p>]]></content:encoded></item><item><title>Action(s) hits the top 5&#x25; rated on developer.com</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-07-22T20:00:46+10:00</dc:date><link>https://www.jbbres.com/files/9317207cfd6cebad2b5dd351a9d4bf06-51.html#unique-entry-id-51</link><guid isPermaLink="true">https://www.jbbres.com/files/9317207cfd6cebad2b5dd351a9d4bf06-51.html#unique-entry-id-51</guid><content:encoded><![CDATA[Great new! Action(s) has been reviewed and rated 950 / 1000 by <a href="http://jars.developer.com" target="self" rel="external">JARS</a>, the Java division of <a href="http://jars.developer.com/" target="self" rel="external">developer.com</a>. With this great rating, Action(s) has entered the prestigious top 5% best rated softwares by the website.<br /><br />Action(s) has beed rated 950 over a possible 1 000 points. The rating is divided in tree parts:<br /><ul class="disc"><li>Presentation: 350 over 400 possible points</li><li>Function: 300 over 300 possible points</li><li>Originality: 300 over 300 possible points</li></ul><br />Find more information at <a href="http://jars.developer.com/utilities/other/resource.php/41601" target="self" rel="external">http://jars.developer.com/utilities/other/resource.php/41601</a>.]]></content:encoded></item><item><title>News collections of actions</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-07-11T15:03:30+10:00</dc:date><link>https://www.jbbres.com/files/067a2a4a691e285292c6e327d6a07e92-52.html#unique-entry-id-52</link><guid isPermaLink="true">https://www.jbbres.com/files/067a2a4a691e285292c6e327d6a07e92-52.html#unique-entry-id-52</guid><content:encoded><![CDATA[This week have been very busy for us at app.jbbres.com, but we are proud to release today two new great free collections of actions:<br /><ul class="disc"><li>The first collection gives you control over the <strong><a href="https://app.jbbres.com/actions/more/20100711002/index.html" target="self" title="20100711002">mouse and keyboard</a></strong> of the computer: the 9 actions included into this pack allows you to move the mouse over the screen, click a mouse button, press a combination of keys etc.</li><li>The second one is a little action that might be a great help for HTML developers: it <strong><a href="https://app.jbbres.com/actions/more/20100711001/index.html" target="self" title="20100711001" rel="external">converts the received text into the ISO 8859-1 charset for HTML</a></strong>: with this action, no more problem of accents and special characters in your web pages!</li></ul><br />Those great collections of actions are available in the <a href="https://app.jbbres.com/actions/more/index.html" target="self" title="More actions" rel="external">More Actions</a> webpage or by clicking on "<strong>Get more actions...</strong>" in the "<strong>Help</strong>" menu within Action(s).]]></content:encoded></item><item><title>A Little Update</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-07-09T21:59:50+10:00</dc:date><link>https://www.jbbres.com/files/a106462850c41560a31a9019ed4d6766-50.html#unique-entry-id-50</link><guid isPermaLink="true">https://www.jbbres.com/files/a106462850c41560a31a9019ed4d6766-50.html#unique-entry-id-50</guid><content:encoded><![CDATA[Today we are releasing a little update of Action(s) (beta 15). It contains some bugs corrections and user interface updates. But stay tune: new stuffs are coming tomorrow...<br /><br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center>]]></content:encoded></item><item><title>Get More Actions</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-07-04T09:59:09+10:00</dc:date><link>https://www.jbbres.com/files/38f1367a7add2ee345879ef168395354-49.html#unique-entry-id-49</link><guid isPermaLink="true">https://www.jbbres.com/files/38f1367a7add2ee345879ef168395354-49.html#unique-entry-id-49</guid><content:encoded><![CDATA[Some of you may have notice a strange little option in the <strong>Help</strong> menu named "<strong>Get more actions...</strong>".<br /><br /><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/get_more_menu.png" width="427" height="160" /><br /></p><p style="text-align:left;"><br />Action(s) provides a lot of built-in actions to work with files, images, Internet... but depending on what you want to do, this might not be enough. Fortunatly, Action(s) is also made to support additional actions, which means that anybody with some knowledge in computer programing can create new actions and add them into Action(s).<br />In order to help you find new actions, we have create a dedicated webpage where all extentions for Action(s) are available. You can access it by clicking on the "Get more actions..." menu in Action(s) or simply by following <a href="404/404.html" target="self" title="More actions">this link</a>.<br />One on the webpage, simply download the new actions you are interrested in, open the actc file and and the new actions will be instantly available within Action(s). Et voila.<br /><br />But wait, that&rsquo;s not all: today we are providing the very first extention for Action(s). We named it <a href="(null)/(null)" target="self" title="20100703001">Split Files</a> because it&rsquo;s a set of actions to split big files in smaller files. It is very usefull if you want to sent files via the Internet but have a size limitation. We&rsquo;re sure you gonna love it! It is available in the <a href="404/404.html" target="self" title="More actions">Get more actions</a> webpage.<br /><br />If you are a developper and you want to know how to create your own actions, remember that everything you need - API, documentation, tutorial and much more - are available in the <a href="_old/parcours/etudes/etudes.html" target="self" title="Resources for developers">Resources for developpers</a> webpage.</p>]]></content:encoded></item><item><title>The Community Forums are open</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-06-30T21:58:35+10:00</dc:date><link>https://www.jbbres.com/files/674173f07e974cc074a9746b55cee744-48.html#unique-entry-id-48</link><guid isPermaLink="true">https://www.jbbres.com/files/674173f07e974cc074a9746b55cee744-48.html#unique-entry-id-48</guid><content:encoded><![CDATA[Today we are opening the <a href="http://app.jbbres.com/forum" target="self" title="Forums" rel="external">community forums</a> for app.jbbres.com. <br /><br />It's a great place for community interaction, discussion and learning about any and all things Action(s). Our team read the forums frequently, as well as post responses. We hope to learn a lot about what you think of Action(s) and used many ideas posted here on the forums to make it better. <br /><br />The forums are still a little bit &laquo;&nbsp;under construction&nbsp;&raquo;, but we hope we will make them look better. Your comments to make them better are also very welcome.<br /><br />The app.jbbres.com team]]></content:encoded></item><item><title>New Action(s) beta</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-06-26T06:57:05+10:00</dc:date><link>https://www.jbbres.com/files/1cc90b0c15c0eca75f56b0ebcb7238a5-47.html#unique-entry-id-47</link><guid isPermaLink="true">https://www.jbbres.com/files/1cc90b0c15c0eca75f56b0ebcb7238a5-47.html#unique-entry-id-47</guid><content:encoded><![CDATA[Two weeks that Action(s) has been released now and we are still surprised every day by the incredible success it has been. You have been thousands to come give it a try and we got a lot of great reviews and feedbacks from all around the world.<br /><br />During this time, we have been busy at app.jbbres.com to continue improve Action(s). We have listen to your feedbacks and have designed some new great functionalities to make workflow creation easier and safer. They are available right now in the new beta version we are releasing today. This update will download automatically next time you will launch Action(s).<br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><p style="text-align:center;"><br /></p><p style="text-align:left;">Among all the new functionalities and bug corrections of this new beta version, there is one that we are very proud and that we would like to present you: in Action(s), you might have noticed that a lot of the actions need to receive input to work properly. For example, if you add an &ldquo;Add Border to Image&rdquo; action into your workflow, it requires to receive image files to work on, otherwise the action will have no effect.<br />Well now, if you add such an action at the beginning of your workflow, Action(s) knows that it will have no effect and suggests you to add a matching action in front of it.<br /><br /></p><p style="text-align:center;"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/beta12-1.png" width="489" height="166" /><br /></p><p style="text-align:left;"><br />Creating your workflow and automation has never been easier.<br />And more than ever, continue to send us your comments and feedbacks!<br /><br /></p>]]></content:encoded></item><item><title>Introducing Action(s)</title><dc:creator>Jean-Baptiste Bres</dc:creator><category>Action(s)</category><dc:date>2010-06-14T17:56:17+10:00</dc:date><link>https://www.jbbres.com/files/6875889e7bc5f3982320e9ada4609054-46.html#unique-entry-id-46</link><guid isPermaLink="true">https://www.jbbres.com/files/6875889e7bc5f3982320e9ada4609054-46.html#unique-entry-id-46</guid><content:encoded><![CDATA[Today is a great day for us at app.jbbres.com. We are releasing the first public beta of our new software, <strong>Action(s)</strong>.<br /><div class="image-left"><img class="imageStyle" alt="" src="https://www.jbbres.com/files/avatar-2.png" width="205" height="205" /></div><br />Action(s) lets you build workflows that accomplish manual chores quickly, efficiently, and effortlessly. You don&rsquo;t have to know any scripting languages or write any code. Instead, you create and execute automation &ldquo;workflows&rdquo; simply by dragging and dropping each individual step of a process. It&rsquo;s like creating a kitchen recipe.<br /><br />We are very proud of our baby. Here are some of the great features that Action(s) offers:<br /><ul class="disc"><li><strong>Easy-to-use interface</strong>:  Action(s) comes with a library of dozens of actions that users can browse or search to find exactly what they need. Actions are dragged and dropped from the library to create workflows.</li><li><strong>Complete control</strong>: the pre-installed actions allow manipulation of files and folders, image cropping, scaling, conversion, and adjustment, command line execution, variable storage and access and much more.</li><li><strong>Extendable architecture</strong>:  Developers can easily create and share their own actions.</li><li><strong>Re-usable</strong>: Display controls allow action parameters to be customized each time a workflow is executed; encapsulated flow design enables workflows to be used within other workflows.</li><li><strong>Portable</strong>: Java and XML format used by Action(s) ensure that workflows can be shared with others, whatever their operating system is.</li></ul><br />Action(s) is available in English and French and is <strong>free</strong>. <br /><br /><p style="text-align:center;">Simply click on the launch button. Action(s) will download and start.<br /><center><script src="http://www.java.com/js/deployJava.js"></script><script>deployJava.launchButtonPNG='http://app.jbbres.com/jws/icons/actions-jws-launch-button.png';var url = "http://app.jbbres.com/jws/app/actions.jnlp"; deployJava.createWebStartLaunchButton(url, '1.6.0');</script></center><br /><br /></p>]]></content:encoded></item></channel>
</rss>