InfoQ Homepage Security Content on InfoQ
-
Gotchas Using Terraform in a Secure Delivery Pipeline
Anton Babenko discusses how to integrate Terraform in a secure continuous delivery pipeline, explaining how to manage AWS infrastructure in a secure way using Terraform.
-
Using Blockchain Routing to Bring Best of Breed Cybersecurity to the Masses
Steve Perkins explains how to use blockchain routing technology and bring cybersecurity to everyone, everywhere, anytime at an affordable price.
-
Developers as a Malware Distribution Vehicle
Guy Podjarny discusses risk management with examples from role models inside and outside of tech. Podjarny explains cognitive biases and how good security constraints can actually help move faster.
-
Blockchain-Based Identity Management & Upcoming ICO
Armin Ebrahimi discusses how ShoCard uses the blockchain technology to address privacy concerns in identity management.
-
Building a Cloud-Native Compliance Culture
CeeCee O'Connor, Chuck D'Antonio discuss building a compliance engine with Concourse, keeping their teams focused on their application code and minimizing the effort they put into compliance.
-
Cloud Foundry UAA as an Identity Gateway
Sree Tummidi discusses the capabilities of Cloud Foundry’s UAA which make it apt to be used as an identity gateway for both ingress and egress security patterns.
-
Insecure Transit - Microservice Security
Sam Newman outlines some of the key challenges associated with microservice architectures with respect to security, and then looks at approaches to address these issues.
-
Liquidity Modeling in Real Estate Using Survival Analysis
Xinlu Huang and David Lundgren discuss hazard and survival modeling, metrics, and data censoring, describing how Opendoor uses these models to estimate holding times for homes and mitigate risk.
-
Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing
Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.
-
Attack Trees, Security Modeling for Agile Teams
Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.
-
Security Champions: Only You Can Prevent File Forgery
Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.
-
EternalBlue: Exploit Analysis and beyond
Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.