BT
Older rss
28:58

Are Your Microservices Naked and Afraid?

Posted by Alan Ho, Sandeep Murusupalli  on  Sep 18, 2016

Alan Ho and Sandeep Murusupalli discuss the right type of protection (OAuth/Throttling) and monitoring (e.g. bot monitoring) needed to be put in place to properly manage microservices.

40:06

Access and Secret Management in Cloud Services

Posted by Ryan Lane  on  Aug 20, 2016

Ryan Lane talks about the concepts and tooling for wrangling identity, access management, and secrets (passwords, ssl certificates, access tokens, etc.) in cloud services.

36:35

Two-Factor Authentication

Posted by Phil Nash  on  Jul 12, 2016

Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.

26:32

Light and Fluffy APIs in the Cloud

Posted by Shiva Narayanaswamy  on  Feb 16, 2016

Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.

01:29:39

Securing Microservices with Spring Cloud Security

Posted by Will Tran  on  Nov 28, 2015

Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.

52:52

Privacy is Always a Requirement

Posted by Eleanor McHugh  on  Oct 07, 2015

Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.

40:01

Federating the AWS CLI with an Identity Provider

Posted by Paul Moreno  on  Sep 27, 2015 1

Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.

30:04

Practical Insights when Designing an API from Scratch

Posted by Paul Glavich  on  Aug 07, 2015

Paul Glavich discusses design decisions to be made when building a new API regarding versioning, hypermedia usage, authentication and other aspects.

01:31:20

Securing Your Grails App - Beyond Authentication & Authorization

Posted by Colin Harrington  on  Jan 25, 2015

Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats

01:30:45

Security for Microservices with Spring and OAuth2

Posted by Dave Syer  on  Nov 26, 2014

David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.

57:42

Learning Rails for Fun and Nonprofit

Posted by Scott Smerchek  on  Sep 27, 2014

Scott Smerchek presents the benefits of using a nonprofit web project to learn Rails and what he learned while building LoveKC.org, introducing various Rails topics.

01:18:13

Have You Seen Spring Lately?

Posted by Josh Long  on  Aug 31, 2014 1

Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.