Cloud and AWS Security Special Report | |
|
|
|
|
|
A 4-Step Guide to Building Continuous Security into Container Deployment (articles, Sep 30, 2017) | Containers to Overtake VMs in Application Platform Space, Says SDxCentral Survey (news, Aug 21, 2017) | AWS Release 'SAM Local' to Facilitate Local Build and Test of AWS Lambda Serverless Applications (news, Aug 18, 2017) | Serverless Security and Things That Go Bump in the Night (presentations, Aug 16, 2017) | Solving Payment Fraud and User Security with ML (presentations, Oct 05, 2017) |
|
Here are the top 10 risks that show up in AWS. Are you making those same mistakes? We bet you are. Download Now. Sponsored content |
| |
|
Top Viewed Content on InfoQ |
|
Security Considerations and the State of Microservices with Sam Newman (podcasts, Aug 18, 2017) | Operational Considerations for Containers (presentations, Sep 03, 2017) | Secure Microservices Adoption (presentations, Jul 22, 2017) | Serverless Design Patterns with AWS Lambda: Big Data with Little Effort (presentations, Jul 29, 2017) | AWS Release Lambda@Edge, Enabling Node.js Functions to Execute at the Edge Alongside CloudFront CDN (news, Jul 23, 2017) |
|
|
Google has opened up Forseti Security, a set open source tools for Google Cloud Platform (GCP) security, to all GCP users. The project is the result of a collaborative effort from both Spotify and Google, combining what was originally separate work together into a single toolkit. It aims to automate security processes for developers in order for them to develop more freely. | The Java EE Security API, JSR 375, was approved in early August. All members of the JCP Executive Committee voted “Yes”, with zero “No” votes. Intel Corp. did not vote on the JSR. |
|
Enterprises are innovating and delivering digital services quicker than ever before. To achieve success, security must be in place. Learn how to maintain agility and security with "The Six Essentials for DevOps Team Excellence". Sponsored content |
| |
|
AWS Web Application Firewall inspects traffic coming into your web application, looking for suspicious activity. It can pass good requests onto your application and block requests that match common attack vectors - like SQL injection. WAF can add a layer of security onto an existing application without changing the app. | Amazon Web Services (AWS) recently added programmatic creation and manipulation of CloudWatch dashboards and widgets to support use cases such as dynamic resource lifecycle tracking and consistent cross-account dashboard maintenance. | Twistlock announced the general availability of version 2.1 of their container security product. Highlights of the release include an integrated firewall that understands application traffic, vulnerability detection, secrets management via integration with third party tools, and compliance alerting and enforcement. |
|
|
The authors provide a systematic guide to the current literature regarding comprehensive auditing methodologies. They identify the different approaches to cloud data integrity and privacy. |
| |
|
This article explores whether it is possible to build automated classifiers to detect sensitive Twitter accounts. |
| |
|
InfoQ spoke with Elton Stoneman, author of the book Docker on Windows to understand how to run containers on Windows and which kind of workloads are a good choice for migration. |
| |
|
The bad guys are continuously looking for your cloud’s weaknesses, so don’t delay in getting your cloud security into shape. The “AWS Security Fitness Guide” will coach you through the necessary exercises to strengthen your cloud infrastructure. Download Now. Sponsored content |
| |
|
|
Bryan Payne talks about BLESS in general: what it is, how it works, and how we can start using it. He explores the Netflix BLESS production architecture and how other companies have used BLESS. |
| |
|
Ying Li discusses in detail the implementation challenges of Swarm, how her team at Docker greatly reduced the overhead necessary to manage an infrastructure that makes use of TLS certificates. |
| |
|
Irina Guberman discusses challenges using FPGAs and Erlang in IoT, including enforcing security and updating FPGA devices on the fly. |
| |
|
Gabriel Enslein discusses the evolution of fleet orchestration, immutable infrastructure, security auditing for managing data services for many Salesforce customers. |
| |
|
|