InfoQ Homepage Security Content on InfoQ
-
My Other Internet is a Mirage
Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.
-
One Backend Per User: 100% Data Privacy / 0 Scaling Issues
Michiel de Jong suggests solving the data privacy and scalability issues by enabling mobile apps to connect to user's preferred back-end using Dropbox.js, GDrive JS, NimbusBase, remoteStorage.io, etc.
-
API Security and Federation Patterns
The role of API management infrastructure in API Security, API Access Control and API Federation and its interaction with enterprise infrastructure, social identity and application developers.
-
Claims Based Authentication
Justin Kobel introduces claims-based authentication, what are claims, their life cycle, explaining how to consume them in .NET through a number of demoes.
-
Securing Grails Applications
Burt Beckwith discusses the security risks web applications may face (XSS, CRSF, SQL injection) and the libraries and plugins that developers can use to secure their Grails applications.
-
The Magic Behind Enterprise Apps: How to Expose Reliable, Scalable and Secure Enterprise APIs?
Blake Dournaee covers the often forgotten back-end architecture for mobile apps which should expose cross-platform APIs to mitigate some of the effects of mobile O/S fragmentation.
-
The Guessing Game: Alternatives to Agile Estimation
Neil Killick proposes ways to reduce risk and uncertainty, calculate a product’s price, determine delivery dates and roadmap, do Scrum and XP without using estimates.
-
Equity – Transparent and Live Risk Assessment
Tormod Varhaugvik provides a design and rationale for an In Memory and Big Data architecture for live equity and risk assessment, using Tax Norway’ new architecture as an example.
-
Hyper Focused to a Fault
Brittany Tarvin discusses the security and privacy issues related to mobile inter-app communication.
-
Securing Clojure Web Apps and Services with Friend
Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.
-
Surviving in a Feudal Security World
Bruce Schneier puts security in the context of today's allegiance to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.
-
Protecting Mobile Apps and Security around Bring Your Own Device
Alex Batlin and Shane Williams explore the challenges faced maintaining the security of mobile apps and also take a look at the enterprise implications with the push for BYOD.