BT
  • Preparing for Your First MongoDB Deployment: Backup and Security

    by Mat Keep on  Jan 05, 2014 1

    This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Topics like cloud backups with MongoDB Management Service (MMS), authentication, and authorization are covered.

  • Tracking Schedule Progress in Agile

    by Yuval Yeret on  Jan 01, 2014 3

    The challenge of knowing whether we are on track to deliver haunts projectmanagers and developmentmanagers at various levels as their organizations take on agile approaches to product and project development. Driving towards smaller work items and lower work in process brings the benefits of both better project risk management as well as more effective agile execution and learning.

  • Securing Servers in the Cloud: An Interview With Trend Micro

    by Richard Seroter on  Nov 13, 2013

    What’s the best way to protect servers in the cloud? How can you account for the transient nature of cloud servers and provide the same protection in the cloud as on on-premises? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro. You can find Mark on Twitter as @marknca.

PCI SSC 2013 Community Meeting Takeaways

Posted by Eric Sampson on  Oct 18, 2013

Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.

Keeping Your Secrets

Posted by Dennis Sosnoski on  Sep 30, 2013

Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2

Big Data Security: The Evolution of Hadoop’s Security Model

Posted by Kevin T. Smith on  Aug 14, 2013

As Hadoop becomes more popular a platform for data processing, there are more concerns about its security concerns and the insider threats of malicious users in a Hadoop cluster. 1

Securely Managed API Technologies Key to Fostering Market Innovation

Posted by Atchison Frazer on  Jul 19, 2013

Web services offer distinct opportunities for real-time innovation, but requires new standards in the way APIs are secured and managed at the B2B enterprise gateway level.

The Virtual Tug of War

Posted by Michael Rothschild on  Jul 10, 2013

The battle over security and performance is fought by security professionals and network administrators. These factions have to barter an uneasy truce for the organization to survive.

Book Launch of “Commitment”, and an Interview with Olav Maassen, Chris Matts and Chris Geary

Posted by Ben Linders on  Jul 02, 2013

Commitment is a graphical business novel about managing project risks with “Real Options”, a way to improve decision making. InfoQ spoke with the authors about decisions, risks and technical debt. 1

Application Security Testing: The Double-sided Black Box

Posted by Rohit Sethi on  Feb 26, 2013

In this article, Rohit Sethi discusses the opaque nature of security verification tools and processes and the potential for false negatives not covered by techniques like automated dynamic testing. 1

Automating Data Protection Across the Enterprise

Posted by Arshad Noor on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise.

Do we really need identity propagation in SOA and Clouds?

Posted by Michael Poulin on  Aug 20, 2012

While a majority of security specialists are managing identity through SSO nobody has answered the question if identity propagation in SOA and Clouds is feasible from a business perspective. 4

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT