BT
x Your opinion matters! Please fill in the InfoQ Survey about your reading habits!
Older Newer rss
29:24

Common Security Pitfalls for Mobile Apps in the Enterprise

Posted by Kevin Watkins, Steve Hanna  on  Jan 29, 2014

Watkins and Hanna discuss the top 5 security mistakes made by developers, examining them in detail by looking at the code and highlighting the risks from both the consumer and developer perspective.

53:16

My Other Internet is a Mirage

Posted by Anil Madhavapeddy  on  Jan 14, 2014 1

Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.

45:25

One Backend Per User: 100% Data Privacy / 0 Scaling Issues

Posted by Michiel B. de Jong  on  Jan 06, 2014

Michiel de Jong suggests solving the data privacy and scalability issues by enabling mobile apps to connect to user's preferred back-end using Dropbox.js, GDrive JS, NimbusBase, remoteStorage.io, etc.

48:44

API Security and Federation Patterns

Posted by Francois Lascelles  on  Dec 23, 2013

The role of API management infrastructure in API Security, API Access Control and API Federation and its interaction with enterprise infrastructure, social identity and application developers.

52:13

Claims Based Authentication

Posted by Justin Kobel  on  Dec 16, 2013 1

Justin Kobel introduces claims-based authentication, what are claims, their life cycle, explaining how to consume them in .NET through a number of demoes.

01:27:03

Securing Grails Applications

Posted by Burt Beckwith  on  Dec 13, 2013

Burt Beckwith discusses the security risks web applications may face (XSS, CRSF, SQL injection) and the libraries and plugins that developers can use to secure their Grails applications.

38:36

The Magic Behind Enterprise Apps: How to Expose Reliable, Scalable and Secure Enterprise APIs?

Posted by Blake Dournaee  on  Nov 28, 2013

Blake Dournaee covers the often forgotten back-end architecture for mobile apps which should expose cross-platform APIs to mitigate some of the effects of mobile O/S fragmentation.

40:28

The Guessing Game: Alternatives to Agile Estimation

Posted by Neil Killick  on  Nov 23, 2013 1

Neil Killick proposes ways to reduce risk and uncertainty, calculate a product’s price, determine delivery dates and roadmap, do Scrum and XP without using estimates.

46:57

Equity – Transparent and Live Risk Assessment

Posted by Tormod Varhaugvik  on  Aug 13, 2013

Tormod Varhaugvik provides a design and rationale for an In Memory and Big Data architecture for live equity and risk assessment, using Tax Norway’ new architecture as an example.

36:07

Hyper Focused to a Fault

Posted by Brittany Tarvin  on  Jul 31, 2013

Brittany Tarvin discusses the security and privacy issues related to mobile inter-app communication.

38:54

Securing Clojure Web Apps and Services with Friend

Posted by Chas Emerick  on  Jul 11, 2013

Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.

53:01

Surviving in a Feudal Security World

Posted by Bruce Schneier  on  Jun 28, 2013

Bruce Schneier puts security in the context of today's allegiance to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT