InfoQ Homepage Security Content on InfoQ
-
Secure Isolation in Rust: Hypervisors, Containers, and the Future of Composable Infrastructure
Allison Randal discusses how to obtain security through isolation in Rust using hypervisors and containers.
-
CredHub and Secure Credential Management
Peter Blum and Scott Frederick discuss how to enhance security within Cloud Foundry and applications through secret management by utilizing CredHub.
-
Capacity Planning for Crypto Mania
Jordan Sitkin and Luke Demi talk about how Coinbase had to deal with the cryptocurrency spikes of 2017.
-
Security in the Hybrid Cloud at Liberty Mutual
Matt Ruel discusses how Liberty Mutual is delivering customer value quickly via secure pipelines to the cloud.
-
Developer Secure Containers for the Cyberspace Battlefield
Chris Saunders, Jason Scanga discuss issues with container security in a multi-tenant setting, the need to encrypt communications with containers, avoiding vulnerabilities introduced by developers.
-
OWASP Top 10 Vulnerabilities & ASP.NET
Bill Dinger goes over the 2017 OWASP Top 10 vulnerabilities and how they apply to ASP.NET, including a demo of each vulnerability, the risk it poses, how to detect the attack, and how to mitigate it.
-
The Most Secure Program Is One That Doesn’t Exist
Diane Hosfelt gives an overview of how Rust’s design gives security guarantees and discusses goals and visions for the future.
-
DevSecOps: Security at the Speed of DevOps
Larry Maccherone introduces the DevSecOps manifesto and provides a process model to accomplish the necessary mindset shift and achieve effective DevSecOps culture transformation.
-
Using CredHub for Kubernetes Deployments
Peter Blum, Eugene Kiselev discuss using CredHub to store sensitive data in Kubernetes clusters on PCF.
-
Securing OAuth 2.0 Resources in Spring Security 5
Josh Cummings and Joe Grandja take a look at two insecure applications--one a web application and the other a REST API--and integrate them both with an OAuth 2.0 Authorization Server.
-
Securing Pivotal Cloud Foundry by Regularly Rebuilding
Lance Rochelle discusses how rebuilding regularly affects the partnership between the PCF team and other teams within a highly regulated organization, real cost savings, and reducing risk.
-
Microservices Security Patterns & Protocols with Spring & PCF
Adib Saikali introduces the patterns and protocols used to secure microservices, covering JWT, JWA, JWS, JWE, JWK, OAuth2, OpenId Connect, and demoing an application build using Spring & PCF.