InfoQ Homepage Security Content on InfoQ
-
Building a Modern Security Engineering Team
Zane Lackey discusses adapting security to change, building security programs, lessons learned from bug bounty programs, running attack simulations and knowing when security has been breached.
-
Bitcoin Security: 1/10th Cent to a Billion Dollars
Olaf Carlson-Wee explores micropayment and wealth storage use cases for bitcoin and examines cryptosystems used to facilitate micro-penny payments and secure $B in global bitcoin banks.
-
Hash Histories - Toy Blockchains for Great Danger
Chris Anderson discusses Document Coin and using blockchain in new and innovative ways. He presents the JavaScript Cryptography code line by line and runs test cases using Prova in the browser.
-
Two-Factor Authentication
Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.
-
Securing Software by Construction
Jean Yang discusses research ideas to create secure software, what prevents them from becoming commercial solutions, and how the Cybersecurity Factory accelerator bridges the research/industry gap.
-
Scala, ECS, and Docker: Delayed Execution @Coursera
Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.
-
How Will Persistent Memory Change Software Design?
Maciej Maciejewski discusses persistent memory, storage devices, and DRAM, accessing persistent memory with ACPI 6.0 extensions, existing support in the Linux kernel and the NVM library.
-
Real World Experience Report on Running Docker
Ben Hall shares his experience working with Docket for development, testing and deployment into production, discussing scalability, resource management, security and other related issues.
-
Real-Time Fraud Detection with Graphs
Jim Webber talks about several kinds of fraud common in financial services and how each decomposes into a straightforward graph use-case. He explores them using Neo4j and Cypher query language.
-
Light and Fluffy APIs in the Cloud
Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.
-
Hands on Spring Security
Rob Winch discusses how to rapidly and correctly apply Spring Security to an existing application. Rob demos security exploits and shows how to mitigate them, answers frequently asked questions.
-
Is that API Secure?
Marko Vuksanovic walks through HTTP security mechanisms, and how to transfer and store sensitive data.