InfoQ Homepage Security Content on InfoQ
-
Certifying Your Car with Erlang
John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.
-
Security Vulnerabilities for Grown-ups
Vitaly Osipov shares 7 product security lessons learned at Atlassian related to why security incidents happen, what we would like to do about them and what can be done.
-
Hook-up to the Social Networks with OAuth 2.0
John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.
-
OAuth - Everything You Want to Know (Hopefully)
Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.
-
Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
-
Securing the Cloud: Identity Management and Network Security in the Cloud
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
-
Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA
Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.
-
Fighting the 21st Century Fraudster
Kunal Bhasin discusses in-memory and Big Data computing techniques used for the detection of banking fraud in real time.
-
Accessing Real-World APIs from Clojure
Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
-
Mobile App Security Techniques and Traps
Graham Lee discusses designing, building and testing a secure mobile app, detailing several vulnerabilities that can be found in such apps and ways to deal with them.
-
Progressive Architectures at the Royal Bank of Scotland
Ben Stopford, Farzad Pezeshkpour and Mark Atwell discuss: the Manhattan processor – avoiding GC pauses-, beyond messaging with ODC, Risk, data virtualization and collaboration in banking.
-
Language-based Security as Extreme Modularity
Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller (moderator) present their view on achieving security while using modularity for building large systems.