BT
Older Newer rss
48:17

The Imitation Game: The New Frontline of Security

Posted by Shuman Ghosemajumder  on  Dec 04, 2015

S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.

01:32:29

A How-to Guide to Security in the PAAS Cloud

Posted by John Field,Shawn McKinney  on  Nov 28, 2015

John Field and Shawn McKinney examine the security of a typical Java web application and describe 5 common application security architecture patterns taken from real world customer problems.

01:29:39

Securing Microservices with Spring Cloud Security

Posted by Will Tran  on  Nov 28, 2015

Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.

51:11

Weaving Security into the SDLC

Posted by Bill Sempf  on  Oct 28, 2015

Bill Sempf discusses security in the context of the SDLC, presenting the analysis results from reviewing several code sources, the problems found and the corresponding solutions.

35:22

Here Be Dragons: Security Maps of the Container New World

Posted by Josh Bregman  on  Oct 11, 2015

Josh Bregman explores some of the security challenges created by both the development workflow and application runtime, why SecDevOps 1.0 is insufficient, and how SecDevOps 2.0 can help.

52:52

Privacy is Always a Requirement

Posted by Eleanor McHugh  on  Oct 07, 2015

Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.

40:01

Federating the AWS CLI with an Identity Provider

Posted by Paul Moreno  on  Sep 27, 2015 1

Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.

44:29

Crafting an Effective Security Organization

Posted by Rich Smith  on  Sep 06, 2015

Rich Smith discusses the progressive approaches taken by the Etsy security team to provide security while not destroying the freedoms of the Etsy engineering culture that are loved so much.

50:41

Real Threat and Real Defenses – Case Study of the Unknown

Posted by Alex Holden  on  Sep 03, 2015

Alex Holden examines hackers’ techniques, skills, and shortfalls. He takes a snapshot of the current threat landscape and derives practical lessons by analyzing a number of high profile breaches.

51:37

Operating Microservices

Posted by Michael Brunton-Spall  on  Aug 13, 2015 1

Michael Brunton-Spall shows how DevOps-like patterns can be applied on microservices to give the development teams more responsibility for their choices, and much more.

56:57

Designing Secure Services with Unikernels: a Tough Nut to Crack

Posted by Anil Madhavapeddy  on  Aug 09, 2015

Anil Madhavapeddy describes how to design and build "deploy-and-forget" cloud services that are specialized into unikernels, single-address space virtual machines.

30:04

Practical Insights when Designing an API from Scratch

Posted by Paul Glavich  on  Aug 07, 2015

Paul Glavich discusses design decisions to be made when building a new API regarding versioning, hypermedia usage, authentication and other aspects.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.