InfoQ Homepage Security Content on InfoQ
-
Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing
Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.
-
Attack Trees, Security Modeling for Agile Teams
Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.
-
Security Champions: Only You Can Prevent File Forgery
Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.
-
EternalBlue: Exploit Analysis and beyond
Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.
-
Bigger, Faster and More Secure
Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.
-
Encryption without Magic, Risk Management without Pain
Anastasiia Voitova talks about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently & elegantly, and more
-
Healthy Agile Product Security
Molly Crowther discusses how the Pivotal CF teams are working on a secure development lifecycle, some pain points encountered, and best practices for shipping security features quickly.
-
Microservices Panel
The panelists discuss things like security, service meshes and how to troubleshoot distributed systems, looking forward to see what the next 12 months may hold for microservice architectures.
-
AI & Security: Lessons and Challenges
Dawn Song presents results in the area of secure deep learning and how DL systems could be fooled and what can be done, how AI and DL can enable better security, and how security can enable better AI.
-
Securing Serverless – by Breaking in
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping understand the mistakes that can be made, their implications, and how to avoid them.
-
Introduction to Compliance Driven Development (CDD) and Security Centric System Design
Dmitry Didovicher introduces CDD and discusses how they used Pivotal and Compliance Automation technologies to receive a certification to run PostgreSQL-As-A-Service.
-
How Performance Optimizations Shatter Security Boundaries
Moritz Lipp explains how the Meltdown and Spectre vulnerabilities exploit hardware optimizations to read otherwise inaccessible data processed on the computer.