InfoQ Homepage Security Content on InfoQ
Guides
RSS Feed-
The InfoQ eMag: Paths to Production: Deployment Pipelines as a Competitive Advantage
In this eMag, you will be introduced to the paths to production and how several global companies supercharge developers and keep their competitiveness by balancing speed and safety.
-
The InfoQ eMag - DevSecOps: Shifting Left in Practice
There are two aspects that make cybersecurity a difficult problem. The first is that security is broad enough to permeate everything from technology to culture. The second is that while developer productivity and IT operations have improved, security has stayed relatively stagnant with the likelihood of a severe vulnerability in 2021 about the same as it was in 2016.
-
The InfoQ eMag - Taming Complex Systems in Production
To tame complexity and its effects, organizations need a structured, multi-pronged, human-focused approach, that: makes operations work sustainable, centers decisions around customer experience, uses continuous testing, and includes chaos engineering and system observability. In this eMag, we cover all of these topics to help you tame the complexity in your system.
-
The InfoQ eMag: DevSecOps in Practice
In this eMag, we present you expert security advice on how to effectively integrate security practices and processes in the software delivery lifecycle, so that everyone from development to security and operations understands and contributes to the overall security of the applications and infrastructure.
-
The InfoQ eMag: Perspectives on GDPR
This eMag addresses three overlapping but distinct perspectives on the impact of GDPR - customers will be thankful, our reputation will be safeguarded, and crippling fines will be avoided.
-
The Morning Paper Issue 6 - Computer Science Applied
Subtle production failures running Microsoft Azure, identifying users from aggregated mobile data, taking over a city with Philips Hue lightbulbs, processing a trillion edge graph on a single machine, and why Rust should be your systems language of choice.
-
Identity Management on a Shoestring
The authors of this book share their experience and lessons learned while building an enterprise-wide Identity and Access Management system using an architectural approach called LIMA.