BT

New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

Cloud Follow 42 Followers

Google Cloud Security Scanner reaches General Availability

by Kent Weare Follow 7 Followers on  Dec 05, 2015

On October 7, 2015 Google announced its App Engine security service, Google Cloud Security Scanner, has reached general availability. This past February, Google launched a beta version of this service.

Cloud Follow 42 Followers

Introducing Amazon Inspector

by Kent Weare Follow 7 Followers on  Nov 29, 2015

At the recent Re:Invent conference, Amazon announced a new security assessment and compliance service. The service is called Amazon Inspector and is currently in preview.

DevOps Follow 172 Followers

Docker Boosts Security on Containers

by Guillermo Beltri Follow 0 Followers on  Nov 19, 2015

Docker Inc. has announced a new set of security enhancements at DockerCon EU, celebrated in Barcelona on 16-17th/Nov. These enhancements includes hardware signing of container images, content auditing through image scanning and vulnerability detection and granular access control policies with user namespaces.

Cloud Follow 42 Followers

Structure 2015 - State of the Cloud and Container Ecosystems

by Chris Swan Follow 42 Followers on  Nov 19, 2015

Rising from the ashes of GigaOm the tribal gathering of cloud elders that is Structure has returned, and got off to a strong start with Battery Ventures' Adrian Cockcroft presenting on the State of the Cloud and Container Ecosystems. Cockcroft paid particular attention to the impact of containers, which wasn’t even a major discussion topic at the last Structure conference in 2013.

Followers

Storing Secrets at Scale with HashiCorp's Vault: Q&A with Armon Dadgar

by Daniel Bryant Follow 61 Followers on  Sep 09, 2015

After an informative presentation by Armon Dadgar at QCon New York that explored security requirements within modern production systems, InfoQ sat down with Dadgar and asked questions about HashiCorp’s Vault, an open source tool for managing secrets at scale.

Cloud Follow 42 Followers

AWS Simplifies Resource Access with VPC Endpoints, Initially Supporting S3

by Steffen Opel Follow 0 Followers on  Aug 31, 2015

Amazon Web Services recently introduced VPC endpoints to enable a "private connection between your VPC and another AWS service without requiring access over the Internet, through a NAT instance, a VPN connection, or AWS Direct Connect". VPC endpoint policies provide granular access control to other service's resources. Initially available are connections to S3, other services will be added later.

Followers

Intel Multi-OS Engine Enables Porting Android Apps to iOS

by Sergio De Simone Follow 4 Followers on  Aug 03, 2015

Intel has introduced a new feature for its Integrated Native Development Experience (INDE) called Multi-OS Engine that aims to make it easier for Java developers to port their Android apps to the iOS platform.

Followers

Password Manager LastPass Suffers Hacking Attack

by Jeff Martin Follow 4 Followers on  Jun 17, 2015

The web-based LastPass password management service has been hacked according to the company, and the result is that some user data, including email addresses and authentication hashes were obtained by unknown assailants. The breach highlights the risks users take by storing all of their passwords in a centralized location.

Followers

SQL Server 2016: Always Encrypted

by Jonathan Allen Follow 50 Followers on  Jun 16, 2015 5

SQL Server 2016 seeks to make encryption easier via its new Always Encrypted feature. This feature offers a way to ensure that the database never sees unencrypted values without the need to rewrite the application.

Followers

ZeroDB Internals and End-To-End Database Encryption

by Alex Giamas Follow 3 Followers on  Apr 09, 2015

In an article published in their blog, ZeroDB team explains how it works. ZeroDB is an end-to-end encrypted database, which means that the database server does not need to be secure for the data to be safe. The way this works is that query logic is being pushed down to the client. The client also holds the decryption keys for data. The client encrypts data with a symmetric key at time of creation

Followers

Android Apps Are Now Reviewed by Tools and Humans

by Abel Avram Follow 4 Followers on  Mar 17, 2015

Google has quietly introduced an app reviewing process that monitors new apps or updates for policy violations. This process uses automatic tools and sometimes human reviewers that add a few hours of delay in the publishing process.

Followers

Amazon CloudWatch Supports JSON Logs and Integrates AWS CloudTrail

by Steffen Opel Follow 0 Followers on  Feb 12, 2015

Shortly after releasing the AWS CloudTrail Processing Library (CPL), Amazon Web Services has also integrated AWS CloudTrail with Amazon CloudWatch Logs to enable alarms and respective "notifications from CloudWatch, triggered by specific API activity captured by CloudTrail". The implied support for monitoring JSON-formatted logs has recently been officially released as well.

Followers

Amazon releases AWS Key Management Service

by Chris Swan Follow 42 Followers on  Dec 05, 2014

At their re:invent 2014 show Amazon launched AWS Key Management Service (KMS), “a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys”. At launch the service supported EBS, S3 and Redshift. Additional support for Elastic Transcoder was added in late November.

Followers

AWS Releases CloudTrail Processing Library

by Steffen Opel Follow 0 Followers on  Nov 15, 2014

Amazon Web Services (AWS) recently released the AWS CloudTrail Processing Library (CPL), a "Java client library that makes it easy to build an application that reads and processes CloudTrail log files in a fault tolerant and highly scalable manner".

Followers

Google to remove support for SSL 3.0

by Alex Blewitt Follow 2 Followers on  Oct 14, 2014 7

Google have announced that they will remove support for the obsolete SSL 3.0 after discovering vulnerabilities that may be exploitable by forcing clients or servers to downgrade. Removing SSL 3.0 may also unlock stalled negotiations with HTTP2. Read on for more details.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT