Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.
Bruce Schneier of the famed Schneier on Security blog puts security in the context of our allegiances to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.
Alex Batlin and Shane Williams explore the challenges faced maintaining the security of mobile apps and also take a look at the enterprise implications with the push for BYOD.
Charles Cai, Ashwani Roy discuss a robust, cost effective, hypothetical solution to address extreme challenges in financial institutions, from decision making support to pricing and risk management.
Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.
Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.
Dan North discusses the need to embrace uncertainty of scope, technology, effort and structure, expecting the unexpectable and anticipating ignorance.
Elonka Dunin reviews the CIA Kryptos’ history, going over the parts that have been solved, and discussing efforts to crack the famous unsolved section, K4.
Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,
Mike Andrews discusses architecting for failure even you when don’t know what might fail.