BT
Older rss
15:48

Aaron Bedra on Security Testing as Software Engineering

Interview with Aaron Bedra on  May 27, 2016

Aaron Bedra talks about property-based testing, BDD-inspired security framework, and how security teams should include developers and be part of the development lifecycle.

25:07

Interview with Gil Tene on Hardware Transactional Memory

Interview with Gil Tene on  Apr 08, 2016

Gil Tene speaks to Alex Blewitt at QCon London 2016 on the upcoming support for hardware transactional memory in server-class Intel chips, and what it will mean for the JVM. Tene discusses what kinds of applications will benefit from speculative lock elision and increasing concurrency in the near future on multi-core server platforms.

37:00

Adam Wick on Security, Formal Methods, Types, Unikernels, HaLVM, DRM

Interview with Adam Wick on  Jan 08, 2016

Adam Wick talks about software security, research into formal methods and randomisation as well as documentation and types to help write secure software, HalVM and other Unikernels, DRM.

36:06

Paul Fremantle on Security in Internet of Things

Interview with Paul Fremantle on  May 09, 2015

The Internet of Things is becoming a part of our lives right now - we are measuring health, we are connecting to our cars, we can open our front door while being half-way around the globe. And while we can benefit from all the sensors and actors around us, there is also a big risk of losing control and data. Paul Fremantle shares some knowledge on potential threads and what we can do about them.

22:35

Jacob Fahrenkrug on Building a Secure Platform for the Smart Home

Interview with Jacob Fahrenkrug on  Jan 23, 2015

The Internet of Things is just around the corner and it will massively impact our lives. Most of the devices in our homes will become connected and collect data or react to certain events. Currently it is still uncertain, how personal data can be protected and leveraged for crowd sourcing and swarm intelligence at the same time. Jacob is sharing the ideas that his company Yetu has to clarify this

16:40

Todd Montgomery on Protocol Design, Security, Formal Verification Tools

Interview with Todd Montgomery on  Dec 19, 2014

Todd Montgomery explains protocol design, the advantages of binary over text protocols, formal verification tools and methods, and much more.

18:44

Software Security, Agile & Protection Poker with Laurie Williams & Catherine Louis

Interview with Laurie Williams and Catherine Louis on  Nov 28, 2014

Laurie and Catherine share a Planning Poker-type practice called Protection Poker that leverages a diversity of ideas, experience, and knowledge related to software security. Protection Poker provides a collaborative, interactive, and informal structure for abuse case development and threat modeling leading to a software security risk estimate and security risk reduction.

18:08

Tim Lister on Risk, Arbitration and Changing Realities of Software Development

Interview with Tim Lister on  May 01, 2014

Tim Lister co-author of Peopleware and Waltzing with Bears, among other books, talks about his experiences arbitrating disputes in systems development, the importance of risk management and how the IT industry is changing with distributed teams.

25:03

Robert Benefield on Business and Operations Collaboration

Interview with Robert Benefield on  Apr 17, 2014

Robert Benefield explains the importance of business and operations understanding each other better and how they can kickstart that understanding through collaboration. He talks about the need to find meaningful metrics for business. He discusses how methodologies for operations (ITIL, COBIT) and development (Scrum, Kanban) differ and what can be learned from both.

19:00

Web Security with Aaron Bedra

Interview with Aaron Bedra on  Dec 13, 2013

Aaron Bedra talks about web security and issues that affect e-commerce and online payments services.

14:11

Tim Lister on 40 Years of Playing Well with Others

Interview with Tim Lister on  Dec 04, 2013

Tim Lister talks about his keynote at the Agile 2013 conference, reflecting on his 40 years in the software industry, the new release of the book Peopleware, risk management in software projects and how teams form.

24:40

Content Security Policy with Mike West

Interview with Mike West on  Nov 29, 2013 1

The Content Security Policy specification is a mechanism web applications can use to mitigate a broad class of content injection vulnerabilities, such as cross-site scripting (XSS). Content Security Policy is a declarative policy that lets web developers inform the client about the sources from which the application expects to load resources.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT