BT
Older rss
30:05

When Your Only Hammer is a Keyboard, Everything Looks Like a Tool

Posted by Darren Hobbs  on  Jul 18, 2014

Darren Hobbs shares lessons learned building polyglot systems, the technology choices made. mitigating risk and delivering value.

39:12

Identity Is the New Currency

Posted by Paul Simmonds  on  Jun 26, 2014

Paul Simmonds discusses the importance of identity and attribute information that will define how access to the functionality and how data is governed by applications in the near future.

37:03

Help, My Security Officer Is Allergic to DevOps

Posted by Frank Breedijk  on  Jun 24, 2014

Frank Breedijk addresses security concerns raised in a DevOps environment that practices continuous deployment.

59:48

Application Security What You Don't Know Can Hurt You

Posted by Joe Kuemerle  on  Jun 20, 2014

Joe Kuemerle discusses some of the top threats that can break an app along with techniques to improve the design of an application to minimize vulnerabilities and mitigate what cannot be removed.

47:20

How I Learned to Stop Worrying and Trust Crypto Again

Posted by Graham Steel  on  Jun 17, 2014

Graham Steel takes a look at some of the cryptographic standards whose security is the subject of speculation and tries to separate rumor from fact. Then he examines some of most widely encountered crypto APIs, evaluating them on two important axes: facilities for flexible, secure key management and provision of modern cryptographic primitives.

40:21

Reflections on Mistrusting Trust: How Policy & Technical People Use the T-word in Opposite Senses

Posted by Caspar Bowden  on  Jun 17, 2014

Caspar Bowden discusses about duplicity, the impact of Snowden's revelations on the society and what can be done about trust today.

53:23

Risk Management is Project Management for Grown-Ups

Posted by Tim Lister  on  Jun 12, 2014

Tim Lister presents the advantages—and the dangers—of practicing risk management in an adult-like fashion, offering a process for tailoring an organization and discussing how an organization can grow up.

46:22

Understanding & Managing Your Digital Footprint

Posted by Robin Wilton  on  Jun 11, 2014

Robin Wilton wonders what are the real costs, risks and economics of digital footprints, and what - if anything - can be done about it? This session examines these issues and makes some practical recommendations about how to understand and manage one's digital footprints.

40:33

Chrome Security

Posted by Parisa Tabriz  on  Apr 09, 2014

Parisa Tabriz presents current online threats and some of the ways Chrome protects users, along with Chrome's philosophies, successes, and ongoing challenges to doing security in a browser.

01:17:30

Plugging the Users in - Extend Your Application with Pluggable Groovy DSL

Posted by Baruch Sadogursky  on  Mar 12, 2014

Baruch Sadogursky discusses creating DSLs which support plugins written both in Groovy or Java, addressing good public API design practices, security, and classpath isolation.

01:30:44

Application Security Pitfalls

Posted by Mike Wiesner  on  Mar 12, 2014

Mike Wiesner advises on dealing with security tradeoffs when creating Servlet Container, Spring MVC or Spring Integration type of applications.

01:19:02

Case Study - Using Grails in the Real World

Posted by Greg Turnquist  on  Feb 13, 2014

Greg Turnquist demoes using Spring Mail, Security, REST, GridFS, Bootstrap and jQuery in a production grade Grails application.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT