InfoQ Homepage Security Content on InfoQ
-
Reactive Spring Security 5.1 by Example
Rob Winch demos applying Spring Security to a reactive application, highlighting some of the new features in Spring Security 5.1.
-
Securing Spring Functions by Breaking in
Guy Podjarny breaks into a Spring Cloud Functions application and exploits multiple weaknesses, explaining how to avoid them.
-
Defense in Depth: in Depth
Chelsea Komlo looks at what defense in depth means from a variety of roles and perspectives, how it can help organizations prevent unforeseen attacks and limit damage when compromises do occur.
-
Seven Strategies for Scaling Product Security
Angelo Prado discusses seven strategies for scaling and embedding security in a product.
-
Data Security Dreams and Nightmares
Alex Holden shares his lessons learned by observing and assisting with data breaches, and explains how to avoid them and what can be done to emerge successfully from a bad situation.
-
Making Security Usable: Product Engineer Perspective
Anastasiia Voitova goes through several stages of inception and implementation of database encryption and intrusion detection tools.
-
It’s 2018; Are My Containers Secure Yet?
Phil Estes discusses recent progress and areas not covered yet in container security, tooling, practices, and technology useful to secure containers.
-
How Blockchain Has Created a New Paradigm in Security
Paul Puey explains how the new type of security created by the cryptocurrency companies could disrupt the way that data is secured outside of the blockchain industry.
-
CI/CD/CS: Implementing Continuous Security across Your Delivery Pipeline and at Run-Time
Jorge Salamero Sanz discusses use case examples on how to make a CI/CD pipeline interact with Docker security tools, and how to prepare for policy violations that happen at runtime.
-
Ethics in Computing Panel
The panelists discuss the important points around privacy, security, safety online, and intent of software today.
-
Cryptoeconomics - The Application of Economic Systems, Incentives and Mechanisms
Jomari Peterson discusses crypto-economics and some of the significant considerations when designing a cryptocurrency.
-
Cybersecurity - Hacking / Anti-Phishing / Social Engineering
Paul Walsh discusses how crypto companies can keep their team and their communities safe from cyber attacks.