BT
Older rss
42:38
DevOps Follow 817 Followers

Gotchas Using Terraform in a Secure Delivery Pipeline

Posted by Anton Babenko  on  Aug 12, 2018 Posted by Anton Babenko Follow 0 Followers  on  Aug 12, 2018

Anton Babenko discusses how to integrate Terraform in a secure continuous delivery pipeline, explaining how to manage AWS infrastructure in a secure way using Terraform.

43:27
AI, ML & Data Engineering Follow 866 Followers

Using Blockchain Routing to Bring Best of Breed Cybersecurity to the Masses

Posted by Steve Perkins  on  Aug 12, 2018 Posted by Steve Perkins Follow 0 Followers  on  Aug 12, 2018

Steve Perkins explains how to use blockchain routing technology and bring cybersecurity to everyone, everywhere, anytime at an affordable price.

38:57
Development Follow 604 Followers

Developers as a Malware Distribution Vehicle

Posted by Guy Podjarny  on  Aug 07, 2018 Posted by Guy Podjarny Follow 4 Followers  on  Aug 07, 2018

Guy Podjarny discusses risk management with examples from role models inside and outside of tech. Podjarny explains cognitive biases and how good security constraints can actually help move faster.

49:17
Architecture & Design Follow 2100 Followers

Insecure Transit - Microservice Security

Posted by Sam Newman  on  Jun 05, 2018 Posted by Sam Newman Follow 12 Followers  on  Jun 05, 2018

Sam Newman outlines some of the key challenges associated with microservice architectures with respect to security, and then looks at approaches to address these issues.

21:45
Cloud Follow 279 Followers

Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing

Posted by James Coppock  on  May 12, 2018 Posted by James Coppock Follow 0 Followers , Sheryl Maris Follow 0 Followers , Brad Schaefbauer Follow 0 Followers  on  May 12, 2018

Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.

41:46
Culture & Methods Follow 665 Followers

Attack Trees, Security Modeling for Agile Teams

Posted by Michael Brunton-Spall  on  May 11, 2018 Posted by Michael Brunton-Spall Follow 0 Followers  on  May 11, 2018

Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.

32:54
Culture & Methods Follow 665 Followers

Security Champions: Only You Can Prevent File Forgery

Posted by Marisa Fagan  on  May 09, 2018 Posted by Marisa Fagan Follow 0 Followers  on  May 09, 2018

Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.

33:43
Development Follow 604 Followers

EternalBlue: Exploit Analysis and beyond

Posted by Emma McCall  on  May 09, 2018 Posted by Emma McCall Follow 0 Followers  on  May 09, 2018

Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.

35:15
Architecture & Design Follow 2100 Followers

Bigger, Faster and More Secure

Posted by Laura Bell  on  May 09, 2018 Posted by Laura Bell Follow 1 Followers  on  May 09, 2018

Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.

48:20
Architecture & Design Follow 2100 Followers

Encryption without Magic, Risk Management without Pain

Posted by Anastasiia Voitova  on  May 08, 2018 Posted by Anastasiia Voitova Follow 0 Followers  on  May 08, 2018

Anastasiia Voitova talks about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently & elegantly, and more

31:18
Culture & Methods Follow 665 Followers

Healthy Agile Product Security

Posted by Molly Crowther  on  May 03, 2018 Posted by Molly Crowther Follow 0 Followers  on  May 03, 2018

Molly Crowther discusses how the Pivotal CF teams are working on a secure development lifecycle, some pain points encountered, and best practices for shipping security features quickly.

46:51
Architecture & Design Follow 2100 Followers

Microservices Panel

Posted by Idit Levine  on  Apr 29, 2018 Posted by Idit Levine Follow 3 Followers , Guy Podjarny Follow 4 Followers , Sam Newman Follow 12 Followers , Susanne Kaiser Follow 2 Followers , Mark Burgess Follow 1 Followers  on  Apr 29, 2018

The panelists discuss things like security, service meshes and how to troubleshoot distributed systems, looking forward to see what the next 12 months may hold for microservice architectures.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT