InfoQ Homepage Security Content on InfoQ
-
Mastering Blockchain: Book Review and Author Q&A
Blockchain was invented in 2008 for Bitcoin to solve the main issue with digital currencies, i.e., the possibility that a token be spent more than once by duplicating it. Packt Publishing Mastering Blockchain by Imran Bashir aims to provide a comprehensive introduction to Blockchain, a technology that is claimed to be able to revolutionise our society and impact every industry.
-
GDPR for Operations
With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem.
-
Serverless Security: What's Left to Protect?
This article aims to provide a broad understanding of security in the Serverless world. We'll consider the ways in which Serverless improves security, the areas where it changes security, and the security concerns it hurts.
-
What Should Software Engineers Know about GDPR?
EU General Data Protection Regulation (GDPR) is moving out of the transition period next summer to become enforceable GDPR strongly emphasizes risk-based thinking; you take every step to mitigate privacy risks until the risks become something you can tolerate. As a software developer, this will affect you. This is what you need to know.
-
Cryptocurrency and Online Multiplayer Games
The era of cryptocurrency opens new possibilities for game publishers and developers. However, it is not yet a fully-developed market and there are many things that should be taken into account before entering it. This article reviews the main pros and cons of entering this new and highly volatile field.
-
User Anonymity on Twitter
This article explores how it is possible to measure how many Twitter users adopted anonymous pseudonyms, the correlation between content sensitivity and user anonymity, and whether it would be possible to build automated classifiers that would detect sensitive Twitter accounts.
-
A 4-Step Guide to Building Continuous Security into Container Deployment
Containers face security risks at every stage, from building to shipping to the run-time production phases. Securing them requires a layered strategy throughout the stack and the deployment process.
-
Cloud Data Auditing Techniques with a Focus on Privacy and Security
The authors provide a guide to the current literature regarding comprehensive auditing methodologies. They not only identify and categorize the different approaches to cloud data integrity and privacy but also compare and analyze their relative merits. For example, their research lists the strengths and weaknesses of earlier work on cloud auditing, which allows researchers to design new methods.
-
Security Implications of Permission Models in Smart-Home Application Frameworks
This article presents an analysis of a popular smart-home programming framework, SmartThings, which reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks that can cause physical, financial, and psychological harm.
-
A Roadmap to the Programmable World
The emergence of millions of remotely programmable devices in our surroundings will pose significant challenges for software developers. This article proposes a roadmap from today’s cloud-centric, data-centric Internet of Things systems to the Programmable World highlights those challenges that haven’t received enough attention yet.
-
Philipp Jovanovic on NORX, IoT Security and Blockchain
In this interview, originally published on InfoQ France, Mathieu Bolla talks to Philipp Jovanovic, a Cryptographer at EPFL, about NORX, IoT Security and keeping yourself safe on-line, and Blockchain.
-
Taking an Application-Oriented Approach to Cloud Adoption
Taking an infrastructure-centric approach to cloud adoption can lead to unrealized benefits. Architect Amit Kumar outlines eleven principles to consider when introducing cloud services into your architecture.