BT
Older Newer rss
42:51

What Happens When Data Gets Breached?

Posted by Jarrod Overson  on  Dec 02, 2016 Posted by Jarrod Overson  on  Dec 02, 2016

Jarrod Overson talks about a world where passwords are traded, sold, verified, and used to exploit sites, how to recognize malicious traffic, and how to take a stand against attackers.

58:42

To Spring Security 4.1 and beyond

Posted by Rob Winch  on  Nov 09, 2016 1 Posted by Rob Winch Joe Grandja  on  Nov 09, 2016 1

Rob Winch and Joe Grandja discuss how to easily secure an application with Spring Security 4.1 and focus on some of the new features found in Spring Security 4.1.

33:40

An Authentication and Authorization Architecture for a Microservices World

Posted by David Ferriera  on  Oct 19, 2016 Posted by David Ferriera  on  Oct 19, 2016

David Ferriera describes how ForgeRock provides a standards-based blueprint that offers a flexible solution to balance security and performance while protecting Cloud Foundry services end-to-end.

37:21

Cloud Native Key Management

Posted by Justin Smith  on  Oct 05, 2016 Posted by Justin Smith  on  Oct 05, 2016

Justin Smith discusses credential hygiene in distributed systems, covering topics such as key encrypting keys, hardware security modules, and promising advances in muti-party computation.

29:59

What I Learned from Four Years of Science-ing the Crap out of DevOps

Posted by Nicole Forsgren  on  Sep 22, 2016 Posted by Nicole Forsgren  on  Sep 22, 2016

Nicole Forsgren shares the results of studies spanning four years and 25,000 DevOps data points: continuous delivery and Lean management practices improves quality and security outcomes.

28:58

Are Your Microservices Naked and Afraid?

Posted by Alan Ho  on  Sep 18, 2016 Posted by Alan Ho Sandeep Murusupalli  on  Sep 18, 2016

Alan Ho and Sandeep Murusupalli discuss the right type of protection (OAuth/Throttling) and monitoring (e.g. bot monitoring) needed to be put in place to properly manage microservices.

01:04:16

Security Vulnerabilities in 3rd Party Code: FIX ALL THE THINGS

Posted by Kymberlee Price  on  Sep 14, 2016 Posted by Kymberlee Price  on  Sep 14, 2016

Kymberlee Price discusses vulnerability data and explores the source and spread of these vulnerabilities through products, along with advice on what can be done to address security vulnerabilities.

49:28

Containers, FTW!

Posted by Michael Hausenblas  on  Sep 14, 2016 Posted by Michael Hausenblas  on  Sep 14, 2016

Michael Hausenblas introduces containers, microservices and dealing with security, monitoring and troubleshooting using Apache Mesos/Marathon and Kubernetes.

48:39

Banking from the Future: Cryptocurrency Key Storage

Posted by Olaf Carlson-Wee  on  Sep 11, 2016 Posted by Olaf Carlson-Wee  on  Sep 11, 2016

Olaf Carlson-Wee examines various novel cryptosystems used to facilitate the secure storage of billions of dollars in global crypto banks.

26:47

Cloud Native Security: Rotate, Repair, Repave

Posted by Justin Smith  on  Aug 31, 2016 Posted by Justin Smith  on  Aug 31, 2016

Justin Smith outlines principles and practices of Cloud Native Security and how Cloud Foundry can be part of a strategy to increase velocity and security.

32:00

Getting Towards Real Sandbox Containers

Posted by Jessie Frazelle  on  Aug 28, 2016 Posted by Jessie Frazelle  on  Aug 28, 2016

Jessie Frazelle discusses the differences between application sandboxes and containers, including rootless containers, custom AppArmor profiles, seccomp profiling, and the future of container security

40:06

Access and Secret Management in Cloud Services

Posted by Ryan Lane  on  Aug 20, 2016 Posted by Ryan Lane  on  Aug 20, 2016

Ryan Lane talks about the concepts and tooling for wrangling identity, access management, and secrets (passwords, ssl certificates, access tokens, etc.) in cloud services.

BT