InfoQ Homepage Security Content on InfoQ
-
Mind the Software Gap: How We Can Operationalize Privacy & Compliance
Jean Yang talks about some of the ways GDPR and CCPA can influence software, but also about practical solutions to protecting data privacy and security.
-
Hello, Spring Security 5.2
Rob Winch, Eleftheria Stein-Kousathana and Filip Hanik walk through “hello security,” demonstrating how Spring Security can be customized to meet business requirements.
-
Multi-Tenancy OAuth with Spring Security 5.2
Josh Cummings introduces AuthenticationManagerResolver, a simple interface from Spring Security.
-
Maintaining the Go Crypto Libraries
Filippo Valsorda talks about the challenges in maintaining and keeping the cryptographic libraries written in Go secure, safe, useful and modern.
-
Security for Managers
Mario Areias presents a different way of engaging security, and, in doing so, he’ll make the case that security can deliver value without necessarily being a blocker.
-
How Much Does It Cost to Attack You?
Jarrod Overson describes the cost vs value justification of an attack, how it shifts over time, and why it means that silver bullets just don’t exist.
-
Beyond Entitlements for Cloud-native
Chandra Guntur and Hong Liu show how they use Open Policy Agent with Spring Boot and HOCON to produce a responsibility management solution that scales to volume and performance needs.
-
Software Supply Chain Management with Grafeas and Kritis
Aysylu Greenberg discusses the goals for Grafeas and Kritis used to secure a company's software supply chain, and concludes with the details of current and future development.
-
Modern WAF Bypass Scripting Techniques for Autonomous Attacks
Johnny Xmas talks about some of the techniques people are using in automated attacks and what are some of the ways people use to circumvent website protection.
-
Making 'npm install' Safe
Kate Sills talks about some of the security issues using NPM packages, and Realms and SES (Secure ECMAScript) as possible solutions to NPM package security vulnerabilities.
-
A Continuation of Devops: Policy as Code
Gareth Rushgrove looks at examples of tools that move security controls into code and explores how policy as code can work at the team level.
-
Securing Services Using SSO
Shraya Ramani talks about BuzzFeed’s transition to microservices and their open-source, homegrown, centralized solution - SSO.