InfoQ Homepage Security Content on InfoQ
-
Security for Managers
Mario Areias presents a different way of engaging security, and, in doing so, he’ll make the case that security can deliver value without necessarily being a blocker.
-
How Much Does It Cost to Attack You?
Jarrod Overson describes the cost vs value justification of an attack, how it shifts over time, and why it means that silver bullets just don’t exist.
-
Beyond Entitlements for Cloud-native
Chandra Guntur and Hong Liu show how they use Open Policy Agent with Spring Boot and HOCON to produce a responsibility management solution that scales to volume and performance needs.
-
Software Supply Chain Management with Grafeas and Kritis
Aysylu Greenberg discusses the goals for Grafeas and Kritis used to secure a company's software supply chain, and concludes with the details of current and future development.
-
Modern WAF Bypass Scripting Techniques for Autonomous Attacks
Johnny Xmas talks about some of the techniques people are using in automated attacks and what are some of the ways people use to circumvent website protection.
-
Making 'npm install' Safe
Kate Sills talks about some of the security issues using NPM packages, and Realms and SES (Secure ECMAScript) as possible solutions to NPM package security vulnerabilities.
-
A Continuation of Devops: Policy as Code
Gareth Rushgrove looks at examples of tools that move security controls into code and explores how policy as code can work at the team level.
-
Securing Services Using SSO
Shraya Ramani talks about BuzzFeed’s transition to microservices and their open-source, homegrown, centralized solution - SSO.
-
Speed the Right Way: Design and Security in Agile
Kevin Gilpin discusses the renewed focus of the software design process and code complexity in software security, describing how design review can be modernized to help improve application security.
-
What Lies between: the Challenges of Operationalizing Microservices
Colin Breck presents practical approaches to take microservices into production or increase the value provided by existing systems and also explores how to integrate microservices at scale.
-
A Journey into Intel’s SGX
Jessie Frazelle discusses Intel's SGX technology. Frazelle also covers an overview of computer architecture, detailing one hardware version, its flaws and changes to come in a future version.
-
Panel: Secure Isolation of Applications
Applications have been isolated by lots of different means and new methods are appearing. What is secure? Have Spectre and Meltdown changed the landscape? What should be used?