InfoQ Homepage Security Content on InfoQ
-
Trust No One: Securing the Modern Software Supply Chain with Zero Trust
Emma Yuan Fang discusses how to apply Zero Trust principles to secure the software supply chain and CI/CD pipeline, detailing mitigation for major attacks like SolarWinds and dependency confusion.
-
The Way We Manage Compliance is Wrong… and is Changing! Bringing DevOps Principles to Controls and Audit
Ian Miell shares the open-source Continuous Compliance Framework, discussing how to revolutionize audits. He explains shifting from periodic checks to continuous monitoring with DevOps and OSCAL.
-
Secure by Design: Building Security into Engineering Workflows and Teams
Stefania Chaplin discusses how to build security into engineering workflows and teams. She shares how to achieve a security-first culture by focusing on people, processes, and technology.
-
Designing for Defense: Architecting APIs with Zero Trust Principles
Renato Losio and security experts discuss designing for defense and architecting APIs with Zero Trust principles, covering challenges, common vulnerabilities, and practical advice for developers.
-
One Network: Cloud-Agnostic Service and Policy-Oriented Network Architecture
Anna Berenberg reveals Google's shift to One Network, streamlining diverse infrastructures to enhance developer velocity and policy management.
-
Security or Convenience - Why Not Both?
Dorota Parad discusses the BLISS framework for security, showing senior developers and leaders how to enhance security while boosting engineering productivity and minimizing operational friction.
-
Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?
Danielle Sudai discusses Cloud Security Posture Management (CSPM), its lifecycle (inventory, scan, notify), and how it helps developers prevent cloud security incidents.
-
Cloud Attack Emulation: Leveraging the Attacker’s Advantage for Effective Defense
Kennedy Torkura discusses cloud attack emulation, the attacker's perspective, and threat-informed defense for stronger cloud security.
-
LLM and Generative AI for Sensitive Data - Navigating Security, Responsibility, and Pitfalls in Highly Regulated Industries
Stefania Chaplin and Azhir Mahmood discuss responsible, secure, and explainable AI in regulated industries. Learn MLOps, legislation, and future trends.
-
Comprehensive Approaches to Software Supply Chain Security
Mykhailo Brodskyi discusses critical software supply chain security risk categories relevant to FinTech and explains effective mitigation strategies. Real case studies & demo included.
-
Dare Mighty Things: What NASA's Endeavors Teach Us about the Power of Calculated RISCs
Khawaja Shams explores the essence of calculated risks, discussing why these risks are worth taking, how to identify and mitigate potential downsides, and the characteristics of good risks.
-
A Zero Trust Future for Applications: Practical Implementation and Pitfalls
Ashish Rajan shares a practical guide to working on zero trust, exploring where it fails before it starts and where engineers should see quick wins. Surprisingly, the answer is not really DevSecOps.