BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Security Content on InfoQ

  • A Pragmatic Approach to Scaling Security in the Cloud

    Security. Cloud. Two words that are almost always together but rarely happily. Read on to learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud.

  • From MDM to MDM: From Managing Devices to Apps to Data

    Mobile operations management (MOM) is one of the top priorities of today’s modern enterprise. While the first generation of MOM solutions evolved around the management of mobile devices and applications, organizations have quickly realized that an effective enterprise mobile infrastructure requires addressing a more difficult challenge: managing and securing mobile business data.

  • How to Protect Valuable or Personal Data on PC, Hard Drive and Flash Drive

    Approximately 60% of all computers sold worldwide today are portable. Portable computers are taken everywhere, making them an easy target for criminals, especially for the private data they contain. Even a failed hard drive that you send back to your vendor for warranty is a potentially at risk. How can your personal data be protected? With one word - encryption!

  • Answering Common Cloud Security Questions from CIOs

    With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.

  • Big Data Analytics for Security

    In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to efficiently process data for security analysis for use cases like Security Information and Event Management (SIEM) and Fraud Detection.

  • Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property

    Software is in everything from our automobiles to our mobile devices, and as the world becomes even further immersed in the digital era, new security threats are arising beyond the software industry. Today, software products are becoming more susceptible to incidences of reverse-engineering and code tampering – not just outright theft.

  • Preparing for Your First MongoDB Deployment: Backup and Security

    This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Topics like cloud backups with MongoDB Management Service (MMS), authentication, and authorization are covered.

  • Tracking Schedule Progress in Agile

    The challenge of knowing whether we are on track to deliver haunts projectmanagers and developmentmanagers at various levels as their organizations take on agile approaches to product and project development. Driving towards smaller work items and lower work in process brings the benefits of both better project risk management as well as more effective agile execution and learning.

  • Securing Servers in the Cloud: An Interview With Trend Micro

    What’s the best way to protect servers in the cloud? How can you account for the transient nature of cloud servers and provide the same protection in the cloud as on on-premises? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro. You can find Mark on Twitter as @marknca.

  • PCI SSC 2013 Community Meeting Takeaways

    Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.

  • Keeping Your Secrets

    Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how even at full strength most forms of encryption are vulnerable to data capture and later decryption if your private keys are exposed. In this article you'll learn some ways of making it more difficult for anyone to see or alter your data exchanges.

  • Big Data Security: The Evolution of Hadoop’s Security Model

    In his new article, Kevin T Smith focuses on the importance of Big Data Security and he discusses the evolution of Hadoop's security model. He addresses the current trends in Hadoop security implementations and provides an overview of the details of project Rhino aimed to improve the security capabilities of Hadoop and the Hadoop ecosystem.

BT