Paul Fremantle explores the challenges of security for IoT, including reviewing some existing attacks and predicting others, hardware, software, network and cloud attacks.
Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.
Bruce Schneier puts security in the context of today's allegiance to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.
Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.
John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.
Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.
Cloud security, according to IDC (2010), is the main worry for companies. Alon Hazy and Jakob Illeborg Pagter look at the threat landscape, and examine secure cloud solutions today and in the future.
Nicolai M. Josuttis discusses various issues encountered when implementing SOA security: heterogeneity and debugging are problematic, ESB plays an important role, and costs involved.