InfoQ Homepage Verification Content on InfoQ
Articles
RSS Feed-
Mitigating Inside and Outside Threats with Zero Trust Security
As ransomware and phishing attacks increase, it is evident that attack vectors can be found on the inside in abundance. Zero Trust Security can be thought of as a new security architecture approach where the main goals are: verifying endpoints before any network communications take place, giving least privilege to endpoints, and continuously evaluating the endpoints throughout the communication.
-
Verification and Validation for Trustworthy Software Systems
In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems using techniques like statechart assertions, runtime execution monitoring, and scenario-based testing.