BT
Older rss
43:41

Offense at Scale

Posted by Chris Rohlf  on  Jul 24, 2016

Chris Rohlf talks about how we look at offense in a world of large containerized deployments and ephemeral environments, explaining why the traditional model is no longer relevant.

42:36

The Nihilist’s Guide to Wrecking Humans & Systems

Posted by Christina Camilleri  on  Jul 17, 2016 1

Christina Camilleri talks about how social engineering can be used in conjunction with technical attacks to create sophisticated and destructive attack chains and shares some real world war stories.

50:55

Modern iOS Application Security

Posted by Dan Guido  on  Jul 17, 2016

Dan Guido talks about the current state of iOS attacks, reviews available security APIs, why they are not good enough, and the design of the Mobile Application Security Toolkit to address risks.

39:05

Automating Security at Slack

Posted by Ryan Huber  on  Jul 15, 2016

Ryan Huber talks about some of the ways Slack approaches collecting, inspecting, and communicating security information to the security team and to the individuals in their organization.

33:33

Building a Modern Security Engineering Team

Posted by Zane Lackey  on  Jul 13, 2016

Zane Lackey discusses adapting security to change, building security programs, lessons learned from bug bounty programs, running attack simulations and knowing when security has been breached.

42:39

Bitcoin Security: 1/10th Cent to a Billion Dollars

Posted by Olaf Carlson-Wee  on  Jul 13, 2016

Olaf Carlson-Wee explores micropayment and wealth storage use cases for bitcoin and examines cryptosystems used to facilitate micro-penny payments and secure $B in global bitcoin banks.

48:49

Hash Histories - Toy Blockchains for Great Danger

Posted by Chris Anderson  on  Jul 13, 2016

Chris Anderson discusses Document Coin and using blockchain in new and innovative ways. He presents the JavaScript Cryptography code line by line and runs test cases using Prova in the browser.

36:35

Two-Factor Authentication

Posted by Phil Nash  on  Jul 12, 2016

Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.

54:08

Securing Software by Construction

Posted by Jean Yang  on  Jul 08, 2016

Jean Yang discusses research ideas to create secure software, what prevents them from becoming commercial solutions, and how the Cybersecurity Factory accelerator bridges the research/industry gap.

45:43

Scala, ECS, and Docker: Delayed Execution @Coursera

Posted by Brennan Saeta  on  Jun 05, 2016

Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.

52:13

How Will Persistent Memory Change Software Design?

Posted by Maciej Maciejewski  on  May 29, 2016

Maciej Maciejewski discusses persistent memory, storage devices, and DRAM, accessing persistent memory with ACPI 6.0 extensions, existing support in the Linux kernel and the NVM library.

52:18

Real World Experience Report on Running Docker

Posted by Ben Hall  on  Apr 22, 2016

Ben Hall shares his experience working with Docket for development, testing and deployment into production, discussing scalability, resource management, security and other related issues.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT