BT
Older rss
49:17
Architecture & Design Follow 1856 Followers

Insecure Transit - Microservice Security

Posted by Sam Newman  on  Jun 05, 2018 Posted by Sam Newman Follow 9 Followers  on  Jun 05, 2018

Sam Newman outlines some of the key challenges associated with microservice architectures with respect to security, and then looks at approaches to address these issues.

21:45
Cloud Follow 250 Followers

Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing

Posted by James Coppock  on  May 12, 2018 Posted by James Coppock Follow 0 Followers , Sheryl Maris Follow 0 Followers , Brad Schaefbauer Follow 0 Followers  on  May 12, 2018

Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.

41:46
Culture & Methods Follow 557 Followers

Attack Trees, Security Modeling for Agile Teams

Posted by Michael Brunton-Spall  on  May 11, 2018 Posted by Michael Brunton-Spall Follow 0 Followers  on  May 11, 2018

Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.

32:54
Culture & Methods Follow 557 Followers

Security Champions: Only You Can Prevent File Forgery

Posted by Marisa Fagan  on  May 09, 2018 Posted by Marisa Fagan Follow 0 Followers  on  May 09, 2018

Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.

33:43
Development Follow 539 Followers

EternalBlue: Exploit Analysis and beyond

Posted by Emma McCall  on  May 09, 2018 Posted by Emma McCall Follow 0 Followers  on  May 09, 2018

Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.

35:15
Architecture & Design Follow 1856 Followers

Bigger, Faster and More Secure

Posted by Laura Bell  on  May 09, 2018 Posted by Laura Bell Follow 1 Followers  on  May 09, 2018

Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.

48:20
Architecture & Design Follow 1856 Followers

Encryption without Magic, Risk Management without Pain

Posted by Anastasiia Voitova  on  May 08, 2018 Posted by Anastasiia Voitova Follow 0 Followers  on  May 08, 2018

Anastasiia Voitova talks about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently & elegantly, and more

31:18
Culture & Methods Follow 557 Followers

Healthy Agile Product Security

Posted by Molly Crowther  on  May 03, 2018 Posted by Molly Crowther Follow 0 Followers  on  May 03, 2018

Molly Crowther discusses how the Pivotal CF teams are working on a secure development lifecycle, some pain points encountered, and best practices for shipping security features quickly.

46:51
Architecture & Design Follow 1856 Followers

Microservices Panel

Posted by Idit Levine  on  Apr 29, 2018 Posted by Idit Levine Follow 3 Followers , Guy Podjarny Follow 2 Followers , Sam Newman Follow 9 Followers , Susanne Kaiser Follow 2 Followers , Mark Burgess Follow 1 Followers  on  Apr 29, 2018

The panelists discuss things like security, service meshes and how to troubleshoot distributed systems, looking forward to see what the next 12 months may hold for microservice architectures.

45:17
AI, ML & Data Engineering Follow 746 Followers

AI & Security: Lessons and Challenges

Posted by Dawn Song  on  Apr 24, 2018 Posted by Dawn Song Follow 0 Followers  on  Apr 24, 2018

Dawn Song presents results in the area of secure deep learning and how DL systems could be fooled and what can be done, how AI and DL can enable better security, and how security can enable better AI.

47:37
Architecture & Design Follow 1856 Followers

Securing Serverless – by Breaking in

Posted by Guy Podjarny  on  Apr 19, 2018 Posted by Guy Podjarny Follow 2 Followers  on  Apr 19, 2018

Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping understand the mistakes that can be made, their implications, and how to avoid them.

47:10
Architecture & Design Follow 1856 Followers

How Performance Optimizations Shatter Security Boundaries

Posted by Moritz Lipp  on  Apr 14, 2018 Posted by Moritz Lipp Follow 0 Followers  on  Apr 14, 2018

Moritz Lipp explains how the Meltdown and Spectre vulnerabilities exploit hardware optimizations to read otherwise inaccessible data processed on the computer.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT