InfoQ Homepage Security Content on InfoQ
-
Case Study: Alternate Blockchains
Jeremy Rand talks about Namecoin and Monero, the advantages to alternate blockchains, and risks of using chains that are not as secured or are merge mined.
-
Practical Blockchains: Building on Bitcoin
Peter Todd answers the questions: why use Bitcoin over other blockchains, what is safe, future proof ways to peg data to Bitcoin's blockchain and what is Bitcoin script, and how it can be used.
-
IoT, DDoS, and the DNS: Development Models for a Hostile Internet
Chris Baker overviews the IoT DDoS landscape, providing both a comprehensive mental model for IoT botnets, as well as sharing some insight into recent adaptations to network threat models.
-
Practical Cryptography & Blockchain Panel
The panel discusses the most important trends involving the blockchain today and fields questions from the audience. Topics covered: smart contracts, oracles, sidechains, and blockchains.
-
Building Reliability in an Unreliable World
Greg Murphy describes how GameSparks has designed their platform to be tolerant of many things: unreliable and slow internet connectivity, cloud resources that can fail without warning, and more.
-
Assuring Crypto-code with Automated Reasoning
A.Tomb describes the capabilities of some open source tools that allow us to automatically determine whether a low-level cryptographic implementation matches a higher-level mathematical specification
-
Security War Stories: The Battle for the Internet of Things
Alasdair Allan discusses the security problems when building Internet of Things devices, and the underlying differences between the IoT and the digital Internet that drive those security issues.
-
Selling Unikernels: The CyberChaff Experience
Adam Wick talks about his team’s experience developing CyberChaff, a novel network defense solution with unikernels built into its core and why unikernels made sense for them.
-
The Seven Righteous Fights
Heidi Waterhouse discusses seven issues to tackle during project development: Localization, Security, Extensibility, Documentation, Affordance, Acceptance, Accessibility.
-
Managing Secrets at Scale
Mark Paluch discusses keeping the security bar high while running services that require secrets, securely sharing and managing secrets (certificates, passwords, keys) using Vault and Spring Boot.
-
Modern Web Security, Lazy But Mindful Like a Fox
Albert Yu presents a few viable, usable and effective defensive techniques that developers have often overlooked.
-
OpenID Connect & OAuth - Demystifying Cloud Identity
Filip Hanik and Sree Tummidi talk about the OpenID Connect and OAuth 2, sharing their experiences building the CF User Authentication and Account management project, and OpenID Connect implementation.