InfoQ Homepage Security Content on InfoQ
-
User & Device Identity for Microservices @ Netflix Scale
Satyajit Thadeshwar provides useful insights on how Netflix implemented a secure, token-agnostic, identity solution that works with services operating at a massive scale.
-
Securing Software from the Supply Side
Nickolas Means talks about the tools that GitHub provides for Open Source maintainers to improve the safety and security of the software supply chain at the source.
-
Mind the Software Gap: How We Can Operationalize Privacy & Compliance
Jean Yang talks about some of the ways GDPR and CCPA can influence software, but also about practical solutions to protecting data privacy and security.
-
Hello, Spring Security 5.2
Rob Winch, Eleftheria Stein-Kousathana and Filip Hanik walk through “hello security,” demonstrating how Spring Security can be customized to meet business requirements.
-
Multi-Tenancy OAuth with Spring Security 5.2
Josh Cummings introduces AuthenticationManagerResolver, a simple interface from Spring Security.
-
Maintaining the Go Crypto Libraries
Filippo Valsorda talks about the challenges in maintaining and keeping the cryptographic libraries written in Go secure, safe, useful and modern.
-
Security for Managers
Mario Areias presents a different way of engaging security, and, in doing so, he’ll make the case that security can deliver value without necessarily being a blocker.
-
How Much Does It Cost to Attack You?
Jarrod Overson describes the cost vs value justification of an attack, how it shifts over time, and why it means that silver bullets just don’t exist.
-
Beyond Entitlements for Cloud-native
Chandra Guntur and Hong Liu show how they use Open Policy Agent with Spring Boot and HOCON to produce a responsibility management solution that scales to volume and performance needs.
-
Software Supply Chain Management with Grafeas and Kritis
Aysylu Greenberg discusses the goals for Grafeas and Kritis used to secure a company's software supply chain, and concludes with the details of current and future development.
-
Modern WAF Bypass Scripting Techniques for Autonomous Attacks
Johnny Xmas talks about some of the techniques people are using in automated attacks and what are some of the ways people use to circumvent website protection.
-
Making 'npm install' Safe
Kate Sills talks about some of the security issues using NPM packages, and Realms and SES (Secure ECMAScript) as possible solutions to NPM package security vulnerabilities.