InfoQ Homepage Security Content on InfoQ
-
Big Data Analytics for Security
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to efficiently process data for security analysis for use cases like Security Information and Event Management (SIEM) and Fraud Detection.
-
Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property
Software is in everything from our automobiles to our mobile devices, and as the world becomes even further immersed in the digital era, new security threats are arising beyond the software industry. Today, software products are becoming more susceptible to incidences of reverse-engineering and code tampering – not just outright theft.
-
Preparing for Your First MongoDB Deployment: Backup and Security
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Topics like cloud backups with MongoDB Management Service (MMS), authentication, and authorization are covered.
-
Tracking Schedule Progress in Agile
The challenge of knowing whether we are on track to deliver haunts projectmanagers and developmentmanagers at various levels as their organizations take on agile approaches to product and project development. Driving towards smaller work items and lower work in process brings the benefits of both better project risk management as well as more effective agile execution and learning.
-
Securing Servers in the Cloud: An Interview With Trend Micro
What’s the best way to protect servers in the cloud? How can you account for the transient nature of cloud servers and provide the same protection in the cloud as on on-premises? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro. You can find Mark on Twitter as @marknca.
-
PCI SSC 2013 Community Meeting Takeaways
Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.
-
Keeping Your Secrets
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how even at full strength most forms of encryption are vulnerable to data capture and later decryption if your private keys are exposed. In this article you'll learn some ways of making it more difficult for anyone to see or alter your data exchanges.
-
Big Data Security: The Evolution of Hadoop’s Security Model
In his new article, Kevin T Smith focuses on the importance of Big Data Security and he discusses the evolution of Hadoop's security model. He addresses the current trends in Hadoop security implementations and provides an overview of the details of project Rhino aimed to improve the security capabilities of Hadoop and the Hadoop ecosystem.
-
Securely Managed API Technologies Key to Fostering Market Innovation
Web services offer distinct go-to-market velocity in terms of real-time innovation, but requires new standards in the way APIs are secured and managed and the nature in which APIs communicate between organizations at the B2B enterprise gateway level.
-
The Virtual Tug of War
Technology professionals have always fought an unrelenting war not dissimilar to feud between the Hatfields and McCoys – a continuous conflict with no winners. In the world of IT, this is a battle over security and performance fought by security professionals and network administrators. These two factions have always had to barter and maintain an uneasy truce in organizations in order to survive.
-
Book Launch of “Commitment”, and an Interview with Olav Maassen, Chris Matts and Chris Geary
Commitment is a graphical business novel about managing project risks with “Real Options”, a way of thinking to improve your decision making. InfoQ attended the book launch on May 14 in Amersfoort, The Netherlands and spoke with the authors about decision making, risks and technical debt.
-
Application Security Testing: The Double-sided Black Box
In this article, Rohit Sethi discusses one of the biggest risks with software security, the opaque nature of verification tools and processes, and the potential for false negatives not covered by the different verification techniques. He also talks about some examples of security requirements and examines how common verification methods apply to them.