InfoQ Homepage Security Content on InfoQ
-
Confusion in the Land of the Serverless
Sam Newman introduces serverless computing, discussing how security, resilience, patterns (circuit breaker), vendor lock-in, and microservices are addressed with this technology.
-
Cybercrime and the Developer: How to Start Defending against the Darker Side
Steve Poole discusses actions one can take (and some behaviors one must change) to create a more secure Java application for the cloud.
-
Fighting Online Fraud and Abuse with Large-Scale Machine Learning at Sift Science
Jacob Burnim discusses Sift’s approach to building a ML system to detect fraud and abuse, including training models, handling imbalanced classes, sharing learning, measuring performance, etc..
-
Beyond OAuth2: End to End Microservice Security
Will Tran discusses enforcing microservices’ security policies with OAuth2.
-
Digital Assets: Lessons in Securing What’s Next
Rob Witoff recaps on the past several years at the largest cryptocurrency company in the world and explores technical infrastructure and security lessons learned that apply to what’s next in Fintech.
-
Lessons Learned from Fighting Nation States in Cyber Space
Dmitri Alperovitch covers important lessons learned from the hack of the DNC incidents like nation-state intrusions from China, Iran, North Korea, Russia and other countries.
-
Solving Payment Fraud and User Security with ML
Soups Ranjan talks about Coinbase’s risk program that relies on machine learning (supervised and unsupervised), rules-based systems as well as highly-skilled human fraud fighters.
-
Causal Modeling Using Software Called TETRAD V
Suchitra Abel introduces TETRAD and some of its components used for causal modeling to find out the proper causes and effects of an event.
-
Financial Grade OAuth and OpenID Connect
Nat Sakimura discusses using OAuth and OpenID for securing financial transaction services.
-
Complying or Leveraging PSD2, Which Way to Go?
Bruno Cambounet discusses Open Banking and the European Payment Services Directive, what one needs to know, security and impact on innovation.
-
Operational Considerations for Containers
Chris Swan discusses how to deal with container operational considerations regarding image management, security, audit, logging, orchestration, and how that relates back to developer experience.
-
Serverless Security and Things That Go Bump in the Night
Erik Peterson discusses Serverless architectures and what they mean for the future of cloud applications. Peterson also explores how existing security challenges change and new ones emerge.