BT

New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

Older rss

Towards an Agile Software Architecture

Posted by Boyan Mihaylov on  Dec 28, 2015

Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. 11

Hologram - Finally, AWS Key Distribution that Makes Sense

Posted by Arian Adair on  Mar 31, 2015

Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo Syed Rizvi William Aiken John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1

A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3

Securing Servers in the Cloud: An Interview With Trend Micro

Posted by Richard Seroter on  Nov 13, 2013

What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.

Automating Data Protection Across the Enterprise

Posted by Arshad Noor on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise. 1

Don't SCIM over your Data Model

Posted by Ganesh Prasad on  Aug 08, 2012

This opinion piece discusses limitations in the SCIM data model specification as perceived by the author. He provides three specific suggestions which were also posted to the SCIM mailing list. 5

Standardizing the Cloud for Security

Posted by Orlando Scott-Cowley on  Jul 05, 2012

Orlando Scott-Cowley discusses security in the cloud and the need for industry standards to lower the barriers to entry while ensuring that customer data is safe.

A Distributed Access Control Architecture for Cloud Computing

Posted by Abdulrahman A. Almutairi Muhammad I. Sarfraz Saleh Basalamah Walid G. Aref Arif Ghafoor on  Jun 12, 2012

In this article, authors discuss a distributed architecture based on principles from security management and software engineering to address cloud computing’s security challenges.

BT