BT

Cloud Security  Content on InfoQ rss

News about Cloud Security rss

Culture & Methods Follow 802 Followers Compliance in an Agile World by Ben Linders Follow 28 Followers Posted on Sep 14, 2018 Development Follow 688 Followers Intel Discloses New Speculative Execution Vulnerability L1 Terminal Fault by Sergio De Simone Follow 18 Followers Posted on Aug 17, 2018 Cloud Follow 332 Followers Azure Virtual WAN and Azure Firewall Now in Public Preview by Steef-Jan Wiggers Follow 7 Followers Posted on Jul 20, 2018
Development Follow 688 Followers Spectre 1.1 and 1.2 Vulnerabilities Disclosed by Sergio De Simone Follow 18 Followers Posted on Jul 15, 2018 Development Follow 688 Followers OpenID Loses Major Proponent, StackOverflow by Jonathan Allen Follow 612 Followers Posted on Jul 11, 2018 3 Cloud Follow 332 Followers AWS Config Gains Cross-Account, Cross-Region Data Aggregation by Steffen Opel Follow 4 Followers Posted on Jun 30, 2018
Development Follow 688 Followers TLBleed Can Leak Cryptographic Keys from CPUs Snooping on TLBs by Sergio De Simone Follow 18 Followers Posted on Jun 26, 2018 Development Follow 688 Followers Lazy FP State Restore Vulnerability Affects Most Intel Core CPUs by Sergio De Simone Follow 18 Followers Posted on Jun 18, 2018 Cloud Follow 332 Followers Amazon Launches a New Cloud Security Service: AWS Firewall Manager by Steef-Jan Wiggers Follow 7 Followers Posted on Apr 27, 2018
Development Follow 688 Followers Intel Starts to Use GPUs for Malware Scanning by Sergio De Simone Follow 18 Followers Posted on Apr 20, 2018 Cloud Follow 332 Followers Amazon Launches AWS Secrets Manager to Securely Store, Distribute, and Rotate Credentials by Steef-Jan Wiggers Follow 7 Followers Posted on Apr 20, 2018 DevOps Follow 972 Followers Chef Enhances Cloud Security Automation in InSpec 2.0 by Helen Beal Follow 4 Followers Posted on Feb 27, 2018
All news

Presentations about Cloud Security rss

Culture & Methods Follow 802 Followers Building a Cloud-Native Compliance Culture by Chuck D'Antonio Follow 0 Followers , CeeCee O'Connor Follow 0 Followers Posted on Jun 24, 2018
Architecture & Design Follow 2425 Followers Introduction to Compliance Driven Development (CDD) and Security Centric System Design by Dmitry Didovicher Follow 0 Followers Posted on Apr 15, 2018
Development Follow 688 Followers Towards Memory Safety in Intel SGX Enclave by Yu Ding Follow 0 Followers Posted on Jan 02, 2018
Architecture & Design Follow 2425 Followers Building Reliability in an Unreliable World by Greg Murphy Follow 0 Followers Posted on Apr 20, 2017
Development Follow 688 Followers How Will Persistent Memory Change Software Design? by Maciej Maciejewski Follow 0 Followers Posted on May 29, 2016
Followers Your Thing is Pwnd: Security Challenges for the Internet of Things by Paul Fremantle Follow 0 Followers Posted on Jun 28, 2015
Followers My Other Internet is a Mirage by Anil Madhavapeddy Follow 0 Followers Posted on Jan 14, 2014 1
Followers Surviving in a Feudal Security World by Bruce Schneier Follow 0 Followers Posted on Jun 28, 2013
Followers River Trail – Parallel Programming in JavaScript by Stephan Herhut Follow 0 Followers Posted on Mar 29, 2013
Followers Building a Cloud Ecosystem Architecture by Chris Haddad Follow 0 Followers Posted on Mar 05, 2013
Followers Certifying Your Car with Erlang by John Hughes Follow 0 Followers Posted on Sep 20, 2012 2
Followers Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security by Robert Winch Follow 0 Followers Posted on Aug 03, 2012 3
All presentations

Articles about Cloud Security rss

Cloud Follow 332 Followers Serverless Security: What's Left to Protect? by Guy Podjarny Follow 5 Followers Posted on Feb 23, 2018

Mobile Follow 176 Followers A Roadmap to the Programmable World by Tommi Mikkonen Follow 0 Followers , Antero Taivalsaari Follow 0 Followers Posted on May 27, 2017

Cloud Follow 332 Followers Taking an Application-Oriented Approach to Cloud Adoption by Amit Kumar Follow 0 Followers Posted on May 09, 2017 3

Cloud Follow 332 Followers A Security Approach for a Cloudy World: An Interview with Pete Cheslock by Richard Seroter Follow 8 Followers Posted on Mar 17, 2017

DevOps Follow 972 Followers Respect Your Organisational Monoliths by Margo Cronin Follow 0 Followers Posted on Aug 18, 2016

Culture & Methods Follow 802 Followers Towards an Agile Software Architecture by Boyan Mihaylov Follow 0 Followers Posted on Dec 28, 2015 11

Followers Hologram - Finally, AWS Key Distribution that Makes Sense by Arian Adair Follow 0 Followers Posted on Mar 31, 2015

Followers Cloud Security Auditing: Challenges and Emerging Approaches by Jungwoo Ryoo Follow 0 Followers , John Kissell Follow 0 Followers , William Aiken Follow 0 Followers , Syed Rizvi Follow 0 Followers Posted on Mar 08, 2015 1

Followers A Pragmatic Approach to Scaling Security in the Cloud by Mark Nunnikhoven Follow 0 Followers Posted on Jun 06, 2014 3

Followers Securing Servers in the Cloud: An Interview With Trend Micro by Richard Seroter Follow 8 Followers Posted on Nov 13, 2013

Followers Automating Data Protection Across the Enterprise by Arshad Noor Follow 0 Followers Posted on Feb 07, 2013 1

Followers Don't SCIM over your Data Model by Ganesh Prasad Follow 0 Followers Posted on Aug 08, 2012 5

All articles

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT