InfoQ Homepage Security Content on InfoQ
-
Understanding Cloud, Big Data, Mobile and Security – Do They Play Nicely Together?
Colin Mower discusses the challenges met using together Cloud, Big Data, Mobile and Security and how these can work together to achieve business value.
-
The Five Elements of IoT Security, Open Source to the Rescue!
Julien Vermillard discusses challenges in IoT security regarding hardware, upgrade, transport, credentials, and cloud.
-
Release Testing Is Risk Management Theatre
Steve Smith discusses why Release Testing is an anti-pattern, and offers an alternative risk reduction strategy.
-
Design Goals of the Smallest Federated Wiki
Ward Cunningham discusses the designs goals of a federated wiki.
-
Simplify Project and Portfolio Planning with "Real Options"
Matt Barcomb shares practical ideas for generating and validating projects as Real Options, using value models and risk consideration to create a framework for prioritization and decision-making.
-
Great Single Page Apps Need Great Back-ends
Adib Saikali describes the best practices for building back-end services to support sophisticated single page apps using Spring 4. It contains demo code examples.
-
Java 9 and Beyond
Mark Reinhold keynotes on Java 9’s impact and features –platform module system, security, performance, maintenance-, and speculates on what might come after that, including the Java VM.
-
Too Big to Fail: Running A/B Experiments When You're Betting the Bank
Andrea Burbank discusses the risks, benefits, and lessons from running a single huge experiment with hundreds of moving parts, and with long-term engagement as the metric of success.
-
Spring Boot for the Web Tier
This talk shows what Spring Boot has to offer the web developer out of the box: content negotiation, internationalization, view templates, security, messaging with websockets, etc.
-
Software Security - A Study in Technology Transfer
Gary McGraw keynotes on the internal forces and relationships active inside companies that drive them to success by managing to take ideas and transform them into technologies.
-
Securing Your Grails App - Beyond Authentication & Authorization
Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats
-
The Big Data Imperative: Discovering & Protecting Sensitive Data in Hadoop
Jeremy Stieglitz discusses best practices for a data-centric security , compliance and data governance approach, with a particular focus on two customer use cases.