Older rss

Federating the AWS CLI with an Identity Provider

Posted by Paul Moreno  on  Sep 27, 2015

Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.


Crafting an Effective Security Organization

Posted by Rich Smith  on  Sep 06, 2015

Rich Smith discusses the progressive approaches taken by the Etsy security team to provide security while not destroying the freedoms of the Etsy engineering culture that are loved so much.


Real Threat and Real Defenses – Case Study of the Unknown

Posted by Alex Holden  on  Sep 03, 2015

Alex Holden examines hackers’ techniques, skills, and shortfalls. He takes a snapshot of the current threat landscape and derives practical lessons by analyzing a number of high profile breaches.


Operating Microservices

Posted by Michael Brunton-Spall  on  Aug 13, 2015 1

Michael Brunton-Spall shows how DevOps-like patterns can be applied on microservices to give the development teams more responsibility for their choices, and much more.


Designing Secure Services with Unikernels: a Tough Nut to Crack

Posted by Anil Madhavapeddy  on  Aug 09, 2015

Anil Madhavapeddy describes how to design and build "deploy-and-forget" cloud services that are specialized into unikernels, single-address space virtual machines.


Practical Insights when Designing an API from Scratch

Posted by Paul Glavich  on  Aug 07, 2015

Paul Glavich discusses design decisions to be made when building a new API regarding versioning, hypermedia usage, authentication and other aspects.


Mini-talks: Machine Intelligence, Algorithms for Anti-Money Laundering, Blockchain

Posted by David Beyer, Olaf Carlson-Wee, Richard Minerich  on  Aug 02, 2015

Mini-talks: The Machine Intelligence Landscape: A Venture Capital Perspective. The future of global, trustless transactions on the largest graph: blockchain. Algorithms for Anti-Money Laundering


Hack Your API First

Posted by Troy Hunt  on  Jul 23, 2015

Troy Hunt explain how to discover the vulnerabilities of one’s own APIs, identifying common security anti-patterns.


Your Thing is Pwnd: Security Challenges for the Internet of Things

Posted by Paul Fremantle  on  Jun 28, 2015

Paul Fremantle explores the challenges of security for IoT, including reviewing some existing attacks and predicting others, hardware, software, network and cloud attacks.


Welcome to the Internet of Things, By the Way Privacy Is Dead

Posted by Kate Carruthers  on  Jun 26, 2015

Kate Carruthers overviews some of the privacy challenges and security issues introduced by the Internet of Things.


Understanding Cloud, Big Data, Mobile and Security – Do They Play Nicely Together?

Posted by Colin Mower  on  May 12, 2015

Colin Mower discusses the challenges met using together Cloud, Big Data, Mobile and Security and how these can work together to achieve business value.


The Five Elements of IoT Security, Open Source to the Rescue!

Posted by Julien Vermillard  on  May 08, 2015

Julien Vermillard discusses challenges in IoT security regarding hardware, upgrade, transport, credentials, and cloud.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy