BT
  • Big Data Security: The Evolution of Hadoop’s Security Model

    by Kevin T. Smith on  Aug 14, 2013 1

    In his new article, Kevin T Smith focuses on the importance of Big Data Security and he discusses the evolution of Hadoop's security model. He addresses the current trends in Hadoop security implementations and provides an overview of the details of project Rhino aimed to improve the security capabilities of Hadoop and the Hadoop ecosystem.

  • Securely Managed API Technologies Key to Fostering Market Innovation

    by Atchison Frazer on  Jul 19, 2013

    Web services offer distinct go-to-market velocity in terms of real-time innovation, but requires new standards in the way APIs are secured and managed and the nature in which APIs communicate between organizations at the B2B enterprise gateway level.

  • The Virtual Tug of War

    by Michael Rothschild on  Jul 10, 2013

    Technology professionals have always fought an unrelenting war not dissimilar to feud between the Hatfields and McCoys – a continuous conflict with no winners. In the world of IT, this is a battle over security and performance fought by security professionals and network administrators. These two factions have always had to barter and maintain an uneasy truce in organizations in order to survive.

Book Launch of “Commitment”, and an Interview with Olav Maassen, Chris Matts and Chris Geary

Posted by Ben Linders on  Jul 02, 2013

Commitment is a graphical business novel about managing project risks with “Real Options”, a way to improve decision making. InfoQ spoke with the authors about decisions, risks and technical debt. 1

Application Security Testing: The Double-sided Black Box

Posted by Rohit Sethi on  Feb 26, 2013

In this article, Rohit Sethi discusses the opaque nature of security verification tools and processes and the potential for false negatives not covered by techniques like automated dynamic testing. 1

Automating Data Protection Across the Enterprise

Posted by Arshad Noor on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise.

Do we really need identity propagation in SOA and Clouds?

Posted by Michael Poulin on  Aug 20, 2012

While a majority of security specialists are managing identity through SSO nobody has answered the question if identity propagation in SOA and Clouds is feasible from a business perspective. 4

Don't SCIM over your Data Model

Posted by Ganesh Prasad on  Aug 08, 2012

This opinion piece discusses limitations in the SCIM data model specification as perceived by the author. He provides three specific suggestions which were also posted to the SCIM mailing list. 4

Defending against Web Application Vulnerabilities

Posted by Nuno Antunes and Marco Vieira on  Jul 27, 2012

In this article, authors discuss the security in software development life cycle and how to defend against web application vulnerabilities using white-box analysis and black-box testing techniques. 1

Standardizing the Cloud for Security

Posted by Orlando Scott-Cowley on  Jul 05, 2012

Orlando Scott-Cowley discusses security in the cloud and the need for industry standards to lower the barriers to entry while ensuring that customer data is safe.

A Distributed Access Control Architecture for Cloud Computing

Posted by Abdulrahman A. Almutairi, Muhammad I. Sarfraz, Saleh Basalamah, Walid G. Aref, Arif Ghafoor on  Jun 12, 2012

In this article, authors discuss a distributed architecture based on principles from security management and software engineering to address cloud computing’s security challenges.

Managing Security Requirements in Agile Projects

Posted by Rohit Sethi on  Jun 04, 2012

Managing security requirements from early phases of software development is critical. In this article, author Rohit Sethi discusses how to map security requirements to user stories in Agile projects. 2

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2013 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT