InfoQ Homepage Security Content on InfoQ
-
Here Be Dragons: Security Maps of the Container New World
Josh Bregman explores some of the security challenges created by both the development workflow and application runtime, why SecDevOps 1.0 is insufficient, and how SecDevOps 2.0 can help.
-
Privacy is Always a Requirement
Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.
-
Federating the AWS CLI with an Identity Provider
Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.
-
Crafting an Effective Security Organization
Rich Smith discusses the progressive approaches taken by the Etsy security team to provide security while not destroying the freedoms of the Etsy engineering culture that are loved so much.
-
Real Threat and Real Defenses – Case Study of the Unknown
Alex Holden examines hackers’ techniques, skills, and shortfalls. He takes a snapshot of the current threat landscape and derives practical lessons by analyzing a number of high profile breaches.
-
Operating Microservices
Michael Brunton-Spall shows how DevOps-like patterns can be applied on microservices to give the development teams more responsibility for their choices, and much more.
-
Designing Secure Services with Unikernels: a Tough Nut to Crack
Anil Madhavapeddy describes how to design and build "deploy-and-forget" cloud services that are specialized into unikernels, single-address space virtual machines.
-
Practical Insights when Designing an API from Scratch
Paul Glavich discusses design decisions to be made when building a new API regarding versioning, hypermedia usage, authentication and other aspects.
-
Mini-talks: Machine Intelligence, Algorithms for Anti-Money Laundering, Blockchain
Mini-talks: The Machine Intelligence Landscape: A Venture Capital Perspective. The future of global, trustless transactions on the largest graph: blockchain. Algorithms for Anti-Money Laundering
-
Hack Your API First
Troy Hunt explain how to discover the vulnerabilities of one’s own APIs, identifying common security anti-patterns.
-
Your Thing is Pwnd: Security Challenges for the Internet of Things
Paul Fremantle explores the challenges of security for IoT, including reviewing some existing attacks and predicting others, hardware, software, network and cloud attacks.
-
Welcome to the Internet of Things, By the Way Privacy Is Dead
Kate Carruthers overviews some of the privacy challenges and security issues introduced by the Internet of Things.