BT

Application Security  Content on InfoQ rss

Articles about Application Security rss

DevOps Follow 974 Followers Increasing Security with a Service Mesh: Christian Posta Explores the Capabilities of Istio by Christian Posta Follow 3 Followers Posted on Aug 16, 2018

Architecture & Design Follow 2429 Followers The Ethics of Security by Anne Currie Follow 1 Followers Posted on Aug 13, 2018

Cloud Follow 333 Followers A Security Approach for a Cloudy World: An Interview with Pete Cheslock by Richard Seroter Follow 8 Followers Posted on Mar 17, 2017

DevOps Follow 974 Followers Article Series: Containers in the Real World - Stepping Off the Hype Curve by Daniel Bryant Follow 768 Followers Posted on Apr 17, 2016

Enterprise Architecture Follow 188 Followers The Mathematics of Adaptive Security by Matthew Glenn Follow 0 Followers Posted on Nov 01, 2015 1

Followers Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats by Aaron Beuhring Follow 0 Followers , Kyle Salous Follow 0 Followers Posted on Mar 17, 2015 1

News about Application Security rss

DevOps Follow 974 Followers IT Operations Is the Most Predictable DevOps Differentiator Says Damon Edwards at DOES18 London by Helen Beal Follow 4 Followers Posted on Jul 11, 2018 DevOps Follow 974 Followers DevSecOps Grows Up and Finds Itself a Community by Helen Beal Follow 4 Followers Posted on Jul 06, 2018 Development Follow 689 Followers PGP and S/MIME Encrypted Email Vulnerable to Efail Attack by Sergio De Simone Follow 18 Followers Posted on May 18, 2018
Culture & Methods Follow 805 Followers Q&A with Laura Bell on Continuous Security at QCon London by Laura Bell Follow 1 Followers , Rafiq Gemmail Follow 6 Followers Posted on Mar 07, 2018 DevOps Follow 974 Followers Chef Enhances Cloud Security Automation in InSpec 2.0 by Helen Beal Follow 4 Followers Posted on Feb 27, 2018 DevOps Follow 974 Followers NIST Publishes Guidelines on Application Container Security by Hrishikesh Barua Follow 15 Followers Posted on Dec 04, 2017
DevOps Follow 974 Followers Serverless Challenges in Hybrid Environments by Manuel Pais Follow 9 Followers Posted on Nov 30, 2017 Java Follow 1107 Followers Java EE Security API (JSR-375) Approved by Matt Raible Follow 13 Followers Posted on Sep 07, 2017 DevOps Follow 974 Followers Active Management of Open Source Components Delivers Measurable Improvements Claims Sonatype Report by Helen Beal Follow 4 Followers Posted on Jul 31, 2017
Cloud Follow 333 Followers AWS Web Application Firewall: Bolt-on Security for Insecure Websites by Elton Stoneman Follow 2 Followers Posted on Jul 28, 2017 .NET Follow 423 Followers Microsoft Previews Bug and Security Risk Detection on Windows and Linux by Abel Avram Follow 11 Followers Posted on Jul 22, 2017 DevOps Follow 974 Followers Sonatype Acquires Vor Security to Expand Nexus Open-Source Component Support by Helen Beal Follow 4 Followers Posted on Jun 30, 2017
AI, ML & Data Engineering Follow 1005 Followers Apache Metron Graduates to Top-Level Project by Dylan Raithel Follow 8 Followers Posted on May 18, 2017 Architecture & Design Follow 2429 Followers Authentication Strategies in Microservices Systems by Jan Stenberg Follow 37 Followers Posted on Dec 08, 2016 3 Architecture & Design Follow 2429 Followers Microservices and Security by Jan Stenberg Follow 37 Followers Posted on Nov 15, 2016
All news

Presentations about Application Security rss

Architecture & Design Follow 2429 Followers Bigger, Faster and More Secure by Laura Bell Follow 1 Followers Posted on May 09, 2018
Architecture & Design Follow 2429 Followers Building Secure Player Experiences at Riot Games by David Rook Follow 0 Followers Posted on Jun 29, 2017
Development Follow 689 Followers How to Backdoor Invulnerable Code by Josh Schwartz Follow 0 Followers Posted on Jun 29, 2017
Development Follow 689 Followers Security Vulnerabilities in 3rd Party Code: FIX ALL THE THINGS by Kymberlee Price Follow 0 Followers Posted on Sep 14, 2016
Development Follow 689 Followers Two-Factor Authentication by Phil Nash Follow 0 Followers Posted on Jul 12, 2016
AI, ML & Data Engineering Follow 1005 Followers Real-Time Fraud Detection with Graphs by Jim Webber Follow 0 Followers Posted on Mar 29, 2016
Mobile Follow 176 Followers Android Apps, an Attacker’s Perspective by Tony Trummer Follow 0 Followers Posted on Dec 23, 2015
Architecture & Design Follow 2429 Followers Applications Through an Attacker’s Lens by Michael Coates Follow 0 Followers Posted on Dec 18, 2015
Architecture & Design Follow 2429 Followers The Imitation Game: The New Frontline of Security by Shuman Ghosemajumder Follow 0 Followers Posted on Dec 04, 2015
Architecture & Design Follow 2429 Followers Weaving Security into the SDLC by Bill Sempf Follow 0 Followers Posted on Oct 28, 2015
Followers Security for Microservices with Spring and OAuth2 by Dave Syer Follow 1 Followers Posted on Nov 26, 2014
Followers Building Connected Android Apps with Azure by Chris Risner Follow 0 Followers Posted on Aug 02, 2014
Followers Application Security What You Don't Know Can Hurt You by Joe Kuemerle Follow 0 Followers Posted on Jun 20, 2014
Followers Uncle Sam's Guide to Grails Security by Joe Rinehart Follow 0 Followers Posted on Jan 31, 2014
Followers One Backend Per User: 100% Data Privacy / 0 Scaling Issues by Michiel B. de Jong Follow 0 Followers Posted on Jan 06, 2014
All presentations

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT