InfoQ Homepage Security Content on InfoQ
-
How to Harden Applications against IIoT Security Threats
This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
-
Building Tech at Presidential Scale
Dan Woods discusses the unique challenges of building and running tech for a presidential cycle. Woods also describes how ML was applied at foundational points to reduce operating costs and some of the architectural choices made.
-
Application Security Manager: Developer or Security Officer?
The role of the Application Security Manager (ASM) should be the driving force of the overall code review process. An ASM should know about development processes, information security principles, and have solid technical skills. To get a good ASM you can either use experts from a service provider or grow an in-house professional from developers or security specialists.
-
Mobile DevSecOps Is the Road to Mobile Security
In this article, I’ll discuss some of the most common security deficiencies in mobile apps and explain the potential risks to consumers, app developers, and brands, as well how to break the cycle of poor app security, using automated, rapid, continuous, and iterative deployment.
-
Using Cloud Native Buildpacks to Address Security Requirements for the Software Supply Chain
Software supply chain attacks are increasing in severity and frequency, with no clear path laid out towards its mitigation. A simple way to trace the origin of vulnerable components is available in the form of Software Bill Of Materials (SBOMs), generated automatically when using Buildpacks.
-
Virtual Panel: DevSecOps and Shifting Security Left
Recent attacks, that targeted SolarWinds, Colonial Pipeline, and others, have shown that development environments come ever more frequently on the radar of malicious actors. A virtual panel on the value of shifting left security, how to take responsibility for it, and the time-to-market pitfalls.
-
Leveraging Diversity to Enhance Cybersecurity
How can we ensure there is a diverse mindset applied to cybersecurity? By including non-technical people, those from non-traditional backgrounds, and being intentional about avoiding herd mentality. If we as an industry proclaim security as a best practice, we must equally ensure diversity to ensure we have most effectively mitigated the risks that abound.
-
Bootstrapping the Authentication Layer and Server with Auth0.js and Hasura
When you're trying to prototype an MVP for your app and want to start iterating quickly, the upfront cost of setting up authentication can be a massive roadblock. The authentication layer requires significant work, and you must always be on the lookout for security vulnerabilities.
-
How to Bridge the Gap between Netops and Secops for Ultimate Network Management and Security
Sometimes it can seem like a new IT management paradigm arrives every week. First, we had DevOps; then DevSecOps; now the most innovative organizations are talking about AIOps and even NetAIOps. Yet what is often forgotten about in this rush to name new ways of working is that many of them have been in place in the best-run teams for decades - a great example of this is NetOps and SecOps.
-
DevSecOps: the Key to Securing Your Supply Chain in a Multi-Cloud Threatscape
Recent supply chain attacks require businesses to re-evaluate their approach to DevOps, specifically as it relates to security. The DevSecOps focus CI/CD platforms, testing and scanning across the SDLC, and a focus on minimizing manual efforts can not only improve security postures but also improve delivery of business value.
-
DevOps and Cloud InfoQ Trends Report - July 2021
This article summarizes how we see the "cloud computing and DevOps" space in 2021, which focuses on fundamental infrastructure and operational patterns, the realization of patterns in technology frameworks, and the design processes and skills that a software architect or engineer must cultivate.
-
Building Stronger Human Teams by Managing the Inner Lizards
Each of us has an inner lizard that frets constantly about our safety. People come with brains that are pre-configured to scan everything you say for threats to their safety. Learning to recognize when you're operating under reptilian influence is a great start. This article introduces some techniques to help you manage the lizard within you along with those around you.