InfoQ Homepage Security Content on InfoQ
-
DevSecOps: Security at the Speed of DevOps
Larry Maccherone introduces the DevSecOps manifesto and provides a process model to accomplish the necessary mindset shift and achieve effective DevSecOps culture transformation.
-
Using CredHub for Kubernetes Deployments
Peter Blum, Eugene Kiselev discuss using CredHub to store sensitive data in Kubernetes clusters on PCF.
-
Securing OAuth 2.0 Resources in Spring Security 5
Josh Cummings and Joe Grandja take a look at two insecure applications--one a web application and the other a REST API--and integrate them both with an OAuth 2.0 Authorization Server.
-
Securing Pivotal Cloud Foundry by Regularly Rebuilding
Lance Rochelle discusses how rebuilding regularly affects the partnership between the PCF team and other teams within a highly regulated organization, real cost savings, and reducing risk.
-
Microservices Security Patterns & Protocols with Spring & PCF
Adib Saikali introduces the patterns and protocols used to secure microservices, covering JWT, JWA, JWS, JWE, JWK, OAuth2, OpenId Connect, and demoing an application build using Spring & PCF.
-
Intel's Cloud-Native Transformation
Liel Chayoun and Roi Ezra discuss Intel’s transition to cloud-native and microservices.
-
Implementing PII Encryption with PDX Serialization
Gideon Low and Niranjan Sarvi describe an implementation of PII encryption for Geode applications via use of custom PDX Serialization.
-
Securing Microservices in Hybrid Cloud
Komes Subramaniam introduces T-Mobile’s Authentication and Authorization Process (TAAP), presenting how it works and what are the benefits.
-
Risk Profiling
Jaume Jornet talks about why eDreams ODIGEO does Risk Profiling for product teams, how to introduce Risk Profiling in the organizations, and how it helps to move the company to highest maturity levels
-
Reactive Spring Security 5.1 by Example
Rob Winch demos applying Spring Security to a reactive application, highlighting some of the new features in Spring Security 5.1.
-
Securing Spring Functions by Breaking in
Guy Podjarny breaks into a Spring Cloud Functions application and exploits multiple weaknesses, explaining how to avoid them.
-
Defense in Depth: in Depth
Chelsea Komlo looks at what defense in depth means from a variety of roles and perspectives, how it can help organizations prevent unforeseen attacks and limit damage when compromises do occur.