InfoQ Homepage Security Content on InfoQ
-
Cultivating a Learning Organisation
This article explores how creating an internal culture of experimentation and learning enabled a company to keep pace with the rapid iterations in tech that have become the regular way we do business. It shows that psychological safety is a key component of the learning organisation; employees need to be able to experiment and learn from any outcome - without fear that failure will be punished.
-
Seven Steps for Improving Cloud Security with Business Integration
For business owners and information technology professionals, cloud computing has represented a significant advancement in terms of efficiency and supportability. But like with any major shift in the IT industry, the cloud brings a host of new security risks. Let’s take a look at the most common risks associated with integrating cloud-based business systems and how to manage them appropriately.
-
InfoQ’s 2018, and What We Expect to See in 2019
We take a look back at what we say on infoQ in 2018, and think about what the next year might bring.
-
The Current State of Blockchain - Panel Discussion (Part 2)
The final two panelists introduce themselves and share their views of the current state of the Blockchain world. We're joined by Richard Brown, CTO at R3 and David Gerard, journalist and author of "Attack of the 50 Foot Blockchain"
-
The Current State of Blockchain - Panel Discussion (Part 1)
The first two panelists introduce themselves and give their view of the current state of blockchain. John Davies, CTO and co-founder of Velo Payments, and Conor Svensson, author of the web3j library for interacting with the Ethereum blockchain, give their view on the current state of blockchain.
-
Three Keys to a Successful “Pre-Mortem”
Talking about what might go wrong acknowledges that many things are out of our control, and that we might mess up the things which are within our control. To have this conversation safely involves a structured activity called a pre-mortem. If held with some regularity, and always with creative problem solving time at the end, it can build a safe space for adaptation in the face of adversity.
-
Increasing Security with a Service Mesh: Christian Posta Explores the Capabilities of Istio
Istio attempts to solve some particularly difficult challenges when running applications in a cloud platform: application networking, reliability, and observability and (the focus of this article) security. With Istio, communication between services in the mesh is secure and encrypted by default. Istio can also help with "origin" or "end-user" JWT identity token verification.
-
The Ethics of Security
Like security, tech ethics is about trying to prevent our systems from hurting users or anyone else.
-
Q&A on the Book Testing in the Digital Age
The Book Testing in the Digital Age by Tom van de Ven, Rik Marselis, and Humayun Shaukat, explains the impact that developments like robotics, artificial intelligence, internet of things, and big data are having in testing. It explores the challenges and possibilities that the digital age brings us when it comes to testing software systems.
-
Istio and the Future of Service Meshes
A service mesh provides a transparent and language-independent way to flexibly and easily automate networking, security, and observation functions. This article examines the past, present and future of the Istio service mesh. The near-term goal is to launch Istio to 1.0, when the key features will all be in beta, including support for Hybrid environments.
-
Q&A on the Book Accelerate: Building and Scaling High Performance Technology Organizations
The book Accelerate: Building and Scaling High Performance Technology Organizations by Nicole Forsgren, Jez Humble, and Gene Kim, explores the factors that impact software delivery performance and describes capabilities and practices that help to achieve higher levels of throughput, stability, and quality.
-
How to Deal with Open Source Vulnerabilities
Despite the shockwaves following the Equifax hack in September 2017, the industry still has a long way to go in protecting their products. A key area to focus on is the open source components that comprise 60-80% of the code base in modern applications. Learn how to detect vulnerable open source components and keep your products secure.