BT
Older Newer rss
49:04
Architecture & Design Follow 1856 Followers

Control Flow Integrity Using Hardware Counters

Posted by Jamie Butler  on  Dec 15, 2017 1 Posted by Jamie Butler Follow 0 Followers , Cody Pierce Follow 0 Followers  on  Dec 15, 2017 1

J. Butler and C. Pierce present a system for early detection and prevention of unknown exploits. Their system uses Performance Monitoring Unit hardware to enforce coarse-grained Control Flow Integrity

49:45
Architecture & Design Follow 1856 Followers

Architecting a Modern Financial Institution

Posted by Edward Wible  on  Dec 13, 2017 2 Posted by Edward Wible Follow 1 Followers , Rafael Ferreira Follow 2 Followers  on  Dec 13, 2017 2

Edward Wible and Rafael Ferreira discuss the key elements that make Nubank tick for millions of customers every day, and some key security decisions they made along the way.

48:27
Architecture & Design Follow 1856 Followers

From Threat Hunting to Crowd Defense

Posted by Richard Zhao  on  Dec 12, 2017 Posted by Richard Zhao Follow 0 Followers  on  Dec 12, 2017

Richard Zhao talks about TI and AI in real practices, and crowd defense - a way to integrate defense measures against both targeted and untargeted attacks.

43:46
Architecture & Design Follow 1856 Followers

Confusion in the Land of the Serverless

Posted by Sam Newman  on  Nov 12, 2017 1 Posted by Sam Newman Follow 9 Followers  on  Nov 12, 2017 1

Sam Newman introduces serverless computing, discussing how security, resilience, patterns (circuit breaker), vendor lock-in, and microservices are addressed with this technology.

48:29
Java Follow 821 Followers

Cybercrime and the Developer: How to Start Defending against the Darker Side

Posted by Steve Poole  on  Nov 10, 2017 Posted by Steve Poole Follow 0 Followers  on  Nov 10, 2017

Steve Poole discusses actions one can take (and some behaviors one must change) to create a more secure Java application for the cloud.

40:42
AI, ML & Data Engineering Follow 746 Followers

Fighting Online Fraud and Abuse with Large-Scale Machine Learning at Sift Science

Posted by Jacob Burnim  on  Nov 06, 2017 Posted by Jacob Burnim Follow 0 Followers  on  Nov 06, 2017

Jacob Burnim discusses Sift’s approach to building a ML system to detect fraud and abuse, including training models, handling imbalanced classes, sharing learning, measuring performance, etc..

48:41
Architecture & Design Follow 1856 Followers

Beyond OAuth2: End to End Microservice Security

Posted by Will Tran  on  Oct 28, 2017 Posted by Will Tran Follow 2 Followers  on  Oct 28, 2017

Will Tran discusses enforcing microservices’ security policies with OAuth2.

51:49
Architecture & Design Follow 1856 Followers

Digital Assets: Lessons in Securing What’s Next

Posted by Rob Witoff  on  Oct 23, 2017 Posted by Rob Witoff Follow 1 Followers  on  Oct 23, 2017

Rob Witoff recaps on the past several years at the largest cryptocurrency company in the world and explores technical infrastructure and security lessons learned that apply to what’s next in Fintech.

44:23
Development Follow 539 Followers

Lessons Learned from Fighting Nation States in Cyber Space

Posted by Dmitri Alperovitch  on  Oct 18, 2017 1 Posted by Dmitri Alperovitch Follow 0 Followers  on  Oct 18, 2017 1

Dmitri Alperovitch covers important lessons learned from the hack of the DNC incidents like nation-state intrusions from China, Iran, North Korea, Russia and other countries.

39:13
AI, ML & Data Engineering Follow 746 Followers

Solving Payment Fraud and User Security with ML

Posted by Soups Ranjan  on  Oct 05, 2017 Posted by Soups Ranjan Follow 0 Followers  on  Oct 05, 2017

Soups Ranjan talks about Coinbase’s risk program that relies on machine learning (supervised and unsupervised), rules-based systems as well as highly-skilled human fraud fighters.

21:58
AI, ML & Data Engineering Follow 746 Followers

Causal Modeling Using Software Called TETRAD V

Posted by Suchitra Abel  on  Oct 04, 2017 Posted by Suchitra Abel Follow 0 Followers  on  Oct 04, 2017

Suchitra Abel introduces TETRAD and some of its components used for causal modeling to find out the proper causes and effects of an event.

22:06
Web API Follow 229 Followers

Financial Grade OAuth and OpenID Connect

Posted by Nat Sakimura  on  Sep 16, 2017 Posted by Nat Sakimura Follow 0 Followers  on  Sep 16, 2017

Nat Sakimura discusses using OAuth and OpenID for securing financial transaction services.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT