InfoQ Homepage Security Content on InfoQ
-
Containers, FTW!
Michael Hausenblas introduces containers, microservices and dealing with security, monitoring and troubleshooting using Apache Mesos/Marathon and Kubernetes.
-
Banking from the Future: Cryptocurrency Key Storage
Olaf Carlson-Wee examines various novel cryptosystems used to facilitate the secure storage of billions of dollars in global crypto banks.
-
Cloud Native Security: Rotate, Repair, Repave
Justin Smith outlines principles and practices of Cloud Native Security and how Cloud Foundry can be part of a strategy to increase velocity and security.
-
Getting Towards Real Sandbox Containers
Jessie Frazelle discusses the differences between application sandboxes and containers, including rootless containers, custom AppArmor profiles, seccomp profiling, and the future of container security
-
Access and Secret Management in Cloud Services
Ryan Lane talks about the concepts and tooling for wrangling identity, access management, and secrets (passwords, ssl certificates, access tokens, etc.) in cloud services.
-
Offense at Scale
Chris Rohlf talks about how we look at offense in a world of large containerized deployments and ephemeral environments, explaining why the traditional model is no longer relevant.
-
The Nihilist’s Guide to Wrecking Humans & Systems
Christina Camilleri talks about how social engineering can be used in conjunction with technical attacks to create sophisticated and destructive attack chains and shares some real world war stories.
-
Modern iOS Application Security
Dan Guido talks about the current state of iOS attacks, reviews available security APIs, why they are not good enough, and the design of the Mobile Application Security Toolkit to address risks.
-
Automating Security at Slack
Ryan Huber talks about some of the ways Slack approaches collecting, inspecting, and communicating security information to the security team and to the individuals in their organization.
-
Building a Modern Security Engineering Team
Zane Lackey discusses adapting security to change, building security programs, lessons learned from bug bounty programs, running attack simulations and knowing when security has been breached.
-
Bitcoin Security: 1/10th Cent to a Billion Dollars
Olaf Carlson-Wee explores micropayment and wealth storage use cases for bitcoin and examines cryptosystems used to facilitate micro-penny payments and secure $B in global bitcoin banks.
-
Hash Histories - Toy Blockchains for Great Danger
Chris Anderson discusses Document Coin and using blockchain in new and innovative ways. He presents the JavaScript Cryptography code line by line and runs test cases using Prova in the browser.