InfoQ Homepage Security Content on InfoQ
-
Causal Modeling Using Software Called TETRAD V
Suchitra Abel introduces TETRAD and some of its components used for causal modeling to find out the proper causes and effects of an event.
-
Financial Grade OAuth and OpenID Connect
Nat Sakimura discusses using OAuth and OpenID for securing financial transaction services.
-
Complying or Leveraging PSD2, Which Way to Go?
Bruno Cambounet discusses Open Banking and the European Payment Services Directive, what one needs to know, security and impact on innovation.
-
Operational Considerations for Containers
Chris Swan discusses how to deal with container operational considerations regarding image management, security, audit, logging, orchestration, and how that relates back to developer experience.
-
Serverless Security and Things That Go Bump in the Night
Erik Peterson discusses Serverless architectures and what they mean for the future of cloud applications. Peterson also explores how existing security challenges change and new ones emerge.
-
Managing Thousands of Data Services @Heroku
Gabriel Enslein discusses the evolution of fleet orchestration, immutable infrastructure, security auditing for managing data services for many Salesforce customers.
-
Empowering Devices for IoT with Erlang and FPGA
Irina Guberman discusses challenges using FPGAs and Erlang in IoT, including enforcing security and updating FPGA devices on the fly.
-
Doorman - An Osquery Fleet Manager
Marcin Wielgoszewski talks about how his company uses Doorman and osquery to provide visibility into their infrastructure to enforce security.
-
Secure Microservices Adoption
Grygoriy Gonchar describes the benefits of the microservices architecture for security and how to deal with authentication, keeping track of dependencies and storing lots of credentials.
-
BLESS: Better Security and Ops for SSH Access
Bryan Payne talks about BLESS in general: what it is, how it works, and how we can start using it. He explores the Netflix BLESS production architecture and how other companies have used BLESS.
-
Practical mTLS: Security without the Headaches
Ying Li discusses in detail the implementation challenges of Swarm, how her team at Docker greatly reduced the overhead necessary to manage an infrastructure that makes use of TLS certificates.
-
This Will Cut You: Go's Sharper Edges
Thomas Shadwell talks about how distinct, exploitable misuse patterns arise in software languages, and through examples in Go hopes to show the language's distinct security characteristics.