BT

Microsoft Launches Azure Information Protection for Documents

by Irwin Williams on  Jul 11, 2016

Microsoft launched Azure Information Protection (AIP) in early June 2016. The service aims to enable easy classification of documents both for security and taxonomy.

Applying Supply Chain Management to Deliver Faster with Higher Quality

by Ben Linders on  Jun 30, 2016 1

Supply chain management can raise the bar with continuous development, argues Joshua Corman, Director of the Cyber Statecraft Initiative and co-founder of Rugged Software. Our dependence on IT and software is growing faster than our ability to secure it, and applying supply chain approaches to software development helps to address complexity which reduces risks and increases quality.

GitLab 8.9 Adds File Locking, Hardware U2F Support

by David Iffland on  Jun 24, 2016

The release of GitLab 8.9 brings a file locking, a refreshed UI, and hardware-based two-factor authentication. Teaming up with Yubico, developers can now use a hardware YubiKey to automatically authenticate a GitLab session without having to type in a 6-digit TOTP code. In addition, file locking will keep binary assets from getting destroyed during a merge.

Microsoft Introduces Project Bletchley: A Modular Blockchain Fabric

by Kent Weare on  Jun 19, 2016

On June 15th, Microsoft announced their vision for an open blockchain platform which will be powered by Azure. Microsoft is calling this initiative Project Bletchley, which focuses on providing the architectural building blocks for constructing an Enterprise Consortium Blockchain Ecosystem.

Dan Guido: Modern iOS Application Security

by Ralph Winzinger on  Jun 17, 2016

As mobile applications increase in popularity and as more transactions are carried out via mobile devices, security is a topic of growing concern. In his talk "Modern iOS Application Security" at QCon New York 2016, Dan Guido takes a closer look at iOS security. While Apple already provides the means to create highly secured applications, there are still threads that may render them useless.

Java Champions Receive Free IntelliJ IDEA Licenses

by Matt Raible on  May 13, 2016

Being a Java Champion has its perks, and thanks to the generosity of JetBrains, a free license for IntelliJ IDEA is now one of them. The Champions are the latest in the list of groups earning this special JetBrains premium, which also includes approved open source projects, students, and teachers.

Docker Security Scanning

by Chris Swan on  May 10, 2016

Docker Inc have announced general availability of Docker Security Scanning, which was previously known as Project Nautilus. The release comes alongside an update to the CIS Docker Security Benchmark to bring it in line with Docker 1.11.0, and an updated Docker Bench tool for checking that host and daemon configuration match security benchmark recommendations.

GitLab Discloses Critical Vulnerability, Provides Patch

by Sergio De Simone on  May 04, 2016

GitLab has just announced a fix for a number of important security fixes, including a critical privilege escalation, and strongly recommends that all GitLab installations from version 8.2 onwards be upgraded immediately. InfoQ has spoken with GitLab’s Stan Hu, VP of Engineering.

DevOps Days for the Enterprise

by Manuel Pais on  Apr 30, 2016

Last week saw the first DevOps Days conference catering specifically to the enterprise world, in London. Talks ranged from re-thinking (traditional) management processes in a technology-disrupted world to facts and drivers of DevOps adoption by early adopters. The idea of bi-modal IT was also discussed throughout the conference, as well as need for better security and opinionated platforms.

Vulnerability in Java Reflection Library Fixed after 30 Months

by Abraham Marín Pérez on  Apr 28, 2016 4

In July 2013 Security Explorations discovered a vulnerability in Java by which attackers could elevate their access privileges. Oracle released a patch, but a simple modification was discovered that still makes the attack effective. Once known, Oracle released a patch as part of 8u77. In this article we investigate the little understood class loading process at the heart of the problem.

Lessons Learned at the O’Reilly Software Architecture Conference: Day One

by Daniel Bryant on  Apr 15, 2016

This article presents a review of the first day at the O'Reilly Software Architecture conference, held in New York City 12-13th April. Sessions summarised include, ‘blah, blah... microservices...blah, blah’, ‘the evolution of evolutionary architecture’, ‘Death Star Security’, ‘Twelve Patterns for Hypermedia Architecture’, ‘Architecture Without an End State’ and 'Leading Simplicity'.

Capital One Launches Developer Platform

by Benjamin Young on  Apr 07, 2016

Capital One launched the DevExchange Beta developer site and initial API offering last month.

.NET 4.6.2 Preview Brings Security and WPF Features

by Jonathan Allen on  Apr 05, 2016 2

While most of the attention is on .NET Core, work continues on the original .NET Framework. Recently released as a preview, version 4.6.2 is primarily focused on security and WinForms/WPF related features.

Microsoft Reaches New Milestone in Delivering Trusted Cloud Services

by Kent Weare on  Mar 28, 2016

Microsoft recently announced an expansion of their Azure regions world-wide. The number of regions announced now sits at 30, with 22 being generally available (GA). The most recent wave, of Azure regions, focuses on trusted environments for government customers or regions with specific privacy needs.

NPM Worm Vulnerability Disclosed

by Alex Blewitt on  Mar 26, 2016 2

The NPM project has formally acknowledged a long-standing security vulnerability in which it is possible for malicious packages to run arbitrary code on developer's systems, leading to the first NPM created worm. With the recent problems with NPM, is it safe to use any more? InfoQ investigates.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT