Cloud and AWS Security Special Report | |
|
|
|
|
|
Amazon Launches AWS Secrets Manager to Securely Store, Distribute, and Rotate Credentials (news, Apr 20, 2018) | Spring Security 5: The Reactive Parts (presentations, Mar 18, 2018) | Amazon S3 Receives New Updates: New Storage Class and General Availability of S3 Select (news, Apr 13, 2018) | Amazon Web Services Reports That All GA Services Are Now GDPR Ready (news, Apr 03, 2018) |
|
Here are the top 10 risks that show up in AWS. Are you making those same mistakes? We bet you are. Download now. Sponsored content |
| |
|
Top Viewed Content on InfoQ |
|
|
|
At the AWS re:invent conference, the release of Amazon GuardDuty was announced - a managed threat detection service that continuously monitors for malicious or unauthorised behaviour. The service can be centrally managed, is “zero footprint”, and remediation scripts or AWS Lambda functions can be configured to trigger automatically based on GuardDuty findings. | Continuous automation vendor, Chef, has announced the availability of InSpec 2.0, a new version of Chef’s free open source tool that enables DevOps and cross-functional application, infrastructure and security teams to express security and compliance rules as code and assess and remediate compliance issues through the entire software delivery life cycle. |
|
Enterprises are innovating and delivering digital services quicker than ever before. To achieve success, security must be in place. Learn how to maintain agility and security with "The Six Essentials for DevOps Team Excellence". Sponsored content |
| |
|
At CES 2018, Intel CEO Brian Krzanich announced Intel successfully built a 49-qubit chip, which aims to allow researchers to improve error correction techniques and simulate computational problems. |
|
|
Guy Podjarny discusses the Equifax hack and the things we can learn from it, plus serverless architectures and some of their security problems. |
| |
|
This eMag addresses three overlapping but distinct perspectives on the impact of GDPR - customers will be thankful, our reputation will be safeguarded, and crippling fines will be avoided. |
| |
|
This article provides practical examples of how to manage data in microservices, with an emphasis on migrating from a monolithic database. |
| |
|
The bad guys are continuously looking for your cloud’s weaknesses, so don’t delay in getting your cloud security into shape. The “AWS Security Fitness Guide” will coach you through the necessary exercises to strengthen your cloud infrastructure. Download now. Sponsored content |
| |
|
|
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping understand the mistakes that can be made, their implications, and how to avoid them. |
| |
|
Laura Bell talks about the challenges in the emerging space of security and how to work together to fix them. |
| |
|
Paul Sweetman and Alex Harvey discuss how Ocado Technology has built The Ocado Smart Platform, a scalable, AWS-based microservices architecture, combined with GCP analytics and a robotics grid. |
| |
|
Dana Engebretson covers the contextual pros and cons of a number of architectural patterns given real world scalability constraints. |
| |
|
|