BT
Older rss
35:15
Architecture & Design Follow 2007 Followers

Bigger, Faster and More Secure

Posted by Laura Bell  on  May 09, 2018 Posted by Laura Bell Follow 1 Followers  on  May 09, 2018

Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.

54:32
Architecture & Design Follow 2007 Followers

Building Secure Player Experiences at Riot Games

Posted by David Rook  on  Jun 29, 2017 Posted by David Rook Follow 0 Followers  on  Jun 29, 2017

David Rook talks about the Riot Games Application Security program. He focusses on the tech and social aspects of the program and why he feels both are important when it comes to writing secure code.

45:49
Development Follow 569 Followers

How to Backdoor Invulnerable Code

Posted by Josh Schwartz  on  Jun 29, 2017 Posted by Josh Schwartz Follow 0 Followers  on  Jun 29, 2017

Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.

01:04:16
Development Follow 569 Followers

Security Vulnerabilities in 3rd Party Code: FIX ALL THE THINGS

Posted by Kymberlee Price  on  Sep 14, 2016 Posted by Kymberlee Price Follow 0 Followers  on  Sep 14, 2016

Kymberlee Price discusses vulnerability data and explores the source and spread of these vulnerabilities through products, along with advice on what can be done to address security vulnerabilities.

36:35
Development Follow 569 Followers

Two-Factor Authentication

Posted by Phil Nash  on  Jul 12, 2016 Posted by Phil Nash Follow 0 Followers  on  Jul 12, 2016

Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.

42:23
AI, ML & Data Engineering Follow 811 Followers

Real-Time Fraud Detection with Graphs

Posted by Jim Webber  on  Mar 29, 2016 Posted by Jim Webber Follow 0 Followers  on  Mar 29, 2016

Jim Webber talks about several kinds of fraud common in financial services and how each decomposes into a straightforward graph use-case. He explores them using Neo4j and Cypher query language.

35:23
Mobile Follow 144 Followers

Android Apps, an Attacker’s Perspective

Posted by Tony Trummer  on  Dec 23, 2015 Posted by Tony Trummer Follow 0 Followers  on  Dec 23, 2015

Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.

50:00
Architecture & Design Follow 2007 Followers

Applications Through an Attacker’s Lens

Posted by Michael Coates  on  Dec 18, 2015 Posted by Michael Coates Follow 0 Followers  on  Dec 18, 2015

Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.

48:17
Architecture & Design Follow 2007 Followers

The Imitation Game: The New Frontline of Security

Posted by Shuman Ghosemajumder  on  Dec 04, 2015 Posted by Shuman Ghosemajumder Follow 0 Followers  on  Dec 04, 2015

S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.

51:11
Architecture & Design Follow 2007 Followers

Weaving Security into the SDLC

Posted by Bill Sempf  on  Oct 28, 2015 Posted by Bill Sempf Follow 0 Followers  on  Oct 28, 2015

Bill Sempf discusses security in the context of the SDLC, presenting the analysis results from reviewing several code sources, the problems found and the corresponding solutions.

01:30:45
Followers

Security for Microservices with Spring and OAuth2

Posted by Dave Syer  on  Nov 26, 2014 Posted by Dave Syer Follow 0 Followers  on  Nov 26, 2014

David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.

01:07:52
Followers

Building Connected Android Apps with Azure

Posted by Chris Risner  on  Aug 02, 2014 Posted by Chris Risner Follow 0 Followers  on  Aug 02, 2014

Chris Risner demos an Android app built with Azure Mobile Services using structured data stored in the cloud, GCM push notifications with a single line of code, authentication, security and others.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT