InfoQ Homepage Security Content on InfoQ
-
It’s 2018; Are My Containers Secure Yet?
Phil Estes discusses recent progress and areas not covered yet in container security, tooling, practices, and technology useful to secure containers.
-
How Blockchain Has Created a New Paradigm in Security
Paul Puey explains how the new type of security created by the cryptocurrency companies could disrupt the way that data is secured outside of the blockchain industry.
-
CI/CD/CS: Implementing Continuous Security across Your Delivery Pipeline and at Run-Time
Jorge Salamero Sanz discusses use case examples on how to make a CI/CD pipeline interact with Docker security tools, and how to prepare for policy violations that happen at runtime.
-
Ethics in Computing Panel
The panelists discuss the important points around privacy, security, safety online, and intent of software today.
-
Cryptoeconomics - The Application of Economic Systems, Incentives and Mechanisms
Jomari Peterson discusses crypto-economics and some of the significant considerations when designing a cryptocurrency.
-
Cybersecurity - Hacking / Anti-Phishing / Social Engineering
Paul Walsh discusses how crypto companies can keep their team and their communities safe from cyber attacks.
-
Gotchas Using Terraform in a Secure Delivery Pipeline
Anton Babenko discusses how to integrate Terraform in a secure continuous delivery pipeline, explaining how to manage AWS infrastructure in a secure way using Terraform.
-
Using Blockchain Routing to Bring Best of Breed Cybersecurity to the Masses
Steve Perkins explains how to use blockchain routing technology and bring cybersecurity to everyone, everywhere, anytime at an affordable price.
-
Developers as a Malware Distribution Vehicle
Guy Podjarny discusses risk management with examples from role models inside and outside of tech. Podjarny explains cognitive biases and how good security constraints can actually help move faster.
-
Blockchain-Based Identity Management & Upcoming ICO
Armin Ebrahimi discusses how ShoCard uses the blockchain technology to address privacy concerns in identity management.
-
Building a Cloud-Native Compliance Culture
CeeCee O'Connor, Chuck D'Antonio discuss building a compliance engine with Concourse, keeping their teams focused on their application code and minimizing the effort they put into compliance.
-
Cloud Foundry UAA as an Identity Gateway
Sree Tummidi discusses the capabilities of Cloud Foundry’s UAA which make it apt to be used as an identity gateway for both ingress and egress security patterns.