Cloud and AWS Security Special Report | |
|
|
|
|
|
This Will Cut You: Go's Sharper Edges (presentations, Jul 04, 2017) | How to Backdoor Invulnerable Code (presentations, Jun 29, 2017) | Security Implications of Permission Models in Smart-Home Application Frameworks (articles, Jun 07, 2017) | Taking an Application-Oriented Approach to Cloud Adoption (articles, May 09, 2017) | Running a Presidential Campaign with Immutable Infrastructure: Michael Fisher at QCon NY (news, Jun 30, 2017) |
|
Here are the top 10 risks that show up in AWS. Are you making those same mistakes? We bet you are. Download Now. Sponsored content |
| |
|
Top Viewed Content on InfoQ |
|
Serverless Takes DevOps to the Next Level (articles, Apr 28, 2017) | A Series of Unfortunate Container Events at Netflix: Andrew Spyker and Amit Joshi at QCon NYC (news, Jul 02, 2017) | The Paved Road PaaS for Microservices at Netflix: Yunong Xiao at QCon NY (news, Jun 30, 2017) | AWS Greengrass Runs Lambda Functions on IoT Devices (news, Jun 08, 2017) | Deliver Docker Containers Continuously on AWS (presentations, May 25, 2017) |
|
|
In a recent blog post, Amazon announced updates to its MySQL-compatible Database Engine, Aurora. In this update, Amazon is including support for cross region snapshot copy, cross region replication for encrypted databases, cross account encrypted snapshot sharing, adding a region where Aurora can be provisioned and a new instance size called T2.Small. | Integrate 2017, an annual integration event focused on Microsoft Integration technologies, took place in London from June 26th – 28th. Some of the key themes that were discussed include the role of cognitive computing in integration, API orchestration, SaaS connectivity, cloud native integration, the impact of serverless on integration and cloud messaging at scale. |
|
This eBook provides advice from 10 SecDevOps leaders on how to bake security into DevOps practices rather than treating it as an afterthought. Download now. Sponsored content |
| |
|
AWS has released Amazon DynamoDB Accelerator (DAX) in preview, a fully managed write-through caching service that sits logically in front of DynamoDB tables in order to improve performance for read-intensive workloads. DAX is API-compatible with DynamoDB, meaning that existing applications will not have to be re-written to take advantage of DAX. | Hortonworks and Apache announce graduation of Metron, a realtime big data security platform to top-level project at the ASF. | The major story from last week was that malware, described in leaked NSA documents, crippled Windows computers worldwide. The WannaCry Ransomware virus is believed to have hit 200,000 victims in 150 countries, including UK hospitals, utilities in Spain, and Russia’s interior ministry. |
|
|
LinkedIn’s hyper-growth placed strains on the organization’s infrastructure. A new release model was instrumental to scale and led to increased code quality, security, and member satisfaction. |
| |
|
Add serverless computing to the growing list of options developers have when building software. To learn more about the practical implications, InfoQ reached out to three experienced technologists. |
| |
|
The emergence of millions of remotely programmable devices in our surroundings will pose significant challenges for software developers that haven’t received enough attention yet. |
| |
|
This article explores how serverless platforms are built, operated and leveraged for rapid application delivery. A conclusion of this work is that the space is ripe for innovation. |
| |
|
In this ebook, we look at the different pieces of the cloud stack and address their unique security needs with precautions that enterprises should take to make their environment far more resistant to ransomware threats. Download Now. Sponsored content |
| |
|
|
Michael Bruns shows for which purposes serverless is a good fit, how it actually works and in which cases it is better to avoid it. |
| |
|
David Rook talks about the Riot Games Application Security program. He focusses on the tech and social aspects of the program and why he feels both are important when it comes to writing secure code. |
| |
|
Jeremy Rand talks about Namecoin and Monero, the advantages to alternate blockchains, and risks of using chains that are not as secured or are merge mined. |
| |
|
Chris Baker overviews the IoT DDoS landscape, providing both a comprehensive mental model for IoT botnets, as well as sharing some insight into recent adaptations to network threat models. |
| |
|
|