InfoQ Homepage Security Content on InfoQ
-
The Common Pitfalls of Cloud Native Software Supply Chains
Daniel Shapira talks about some of the common security vulnerabilities found in cloud-native environments and why it’s important to take security measures immediately to protect instances in the cloud
-
Quantifying Risk
Markus De Shon talks about the Netflix risk quantification that they introduced in their highest impact areas, and are gradually expanding across the enterprise.
-
Security Culture: Why You Need One and How to Create It
Masha Sedova looks into techniques and cases studies of how to begin to shape an organization’s security culture to become more resilient and enable people-powered security.
-
User & Device Identity for Microservices @ Netflix Scale
Satyajit Thadeshwar provides useful insights on how Netflix implemented a secure, token-agnostic, identity solution that works with services operating at a massive scale.
-
Securing Software from the Supply Side
Nickolas Means talks about the tools that GitHub provides for Open Source maintainers to improve the safety and security of the software supply chain at the source.
-
Mind the Software Gap: How We Can Operationalize Privacy & Compliance
Jean Yang talks about some of the ways GDPR and CCPA can influence software, but also about practical solutions to protecting data privacy and security.
-
Hello, Spring Security 5.2
Rob Winch, Eleftheria Stein-Kousathana and Filip Hanik walk through “hello security,” demonstrating how Spring Security can be customized to meet business requirements.
-
Multi-Tenancy OAuth with Spring Security 5.2
Josh Cummings introduces AuthenticationManagerResolver, a simple interface from Spring Security.
-
Maintaining the Go Crypto Libraries
Filippo Valsorda talks about the challenges in maintaining and keeping the cryptographic libraries written in Go secure, safe, useful and modern.
-
Security for Managers
Mario Areias presents a different way of engaging security, and, in doing so, he’ll make the case that security can deliver value without necessarily being a blocker.
-
How Much Does It Cost to Attack You?
Jarrod Overson describes the cost vs value justification of an attack, how it shifts over time, and why it means that silver bullets just don’t exist.
-
Beyond Entitlements for Cloud-native
Chandra Guntur and Hong Liu show how they use Open Policy Agent with Spring Boot and HOCON to produce a responsibility management solution that scales to volume and performance needs.