Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.
Jean Yang discusses research ideas to create secure software, what prevents them from becoming commercial solutions, and how the Cybersecurity Factory accelerator bridges the research/industry gap.
Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.
Maciej Maciejewski discusses persistent memory, storage devices, and DRAM, accessing persistent memory with ACPI 6.0 extensions, existing support in the Linux kernel and the NVM library.
Ben Hall shares his experience working with Docket for development, testing and deployment into production, discussing scalability, resource management, security and other related issues.
Jim Webber talks about several kinds of fraud common in financial services and how each decomposes into a straightforward graph use-case. He explores them using Neo4j and Cypher query language.
Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.
Rob Winch discusses how to rapidly and correctly apply Spring Security to an existing application. Rob demos security exploits and shows how to mitigate them, answers frequently asked questions.
Marko Vuksanovic walks through HTTP security mechanisms, and how to transfer and store sensitive data.
Andrea Darabos discusses how to lower the startup risk with Minimum Viable Experiments which help product managers and investors build with more confidence and avoid costly mistakes.
Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.
Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.