InfoQ Homepage Security Content on InfoQ
-
Light and Fluffy APIs in the Cloud
Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.
-
Hands on Spring Security
Rob Winch discusses how to rapidly and correctly apply Spring Security to an existing application. Rob demos security exploits and shows how to mitigate them, answers frequently asked questions.
-
Is that API Secure?
Marko Vuksanovic walks through HTTP security mechanisms, and how to transfer and store sensitive data.
-
Build the Right Thing - De-risk Your Products with Experiments
Andrea Darabos discusses how to lower the startup risk with Minimum Viable Experiments which help product managers and investors build with more confidence and avoid costly mistakes.
-
Scammers, Hackers, and Fraud on the Blockchain
Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.
-
Securing Code Through Social Engineering
Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.
-
Android Apps, an Attacker’s Perspective
Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.
-
The State of Securing RESTful APIs with Spring
Rob Winch discusses how to properly secure your RESTful endpoints and explores some common pitfalls when applying security to RESTful APIs with the help of Spring Security.
-
Applications Through an Attacker’s Lens
Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.
-
Improving Cloud Security with Attacker Profiling
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
-
Is your profiler speaking the same language as you?
This talk covers the classic profiler features. What is a hotspot? What is the difference between sampling and instrumentation from the profiler perspective? What are the problems with those methods?
-
The Imitation Game: The New Frontline of Security
S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.