Prepare Your Business Now to Respond to the Next Big Security Flaw
Our team recommends 3 best practices to help your organization react quickly and decisively to the next inevitable security concern.
Our team recommends 3 best practices to help your organization react quickly and decisively to the next inevitable security concern.
Abstract Secure by Design is all about choosing good design principles that yield implicit security benefits. This seems like a solid strategy as it naturally appeals to everyone’s instinct of crafting good software. We simply fool ourselves into coding more securely! But have there been any further insights since the book release in 2019? In … Read More
Podcast: Play in new window | Download (Duration: 35:32 — 29.5MB) | Embed
Today Ken covers ReactJS Concurrent, gets excited about Angular 10, and talks about the way people share and learn from post mortem reports.
Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract “Security though obscurity is no security.” Well… sort of. The truth is much more complicated. Obfuscation is difficult, fragile, and a never ending battle. But sometimes it’s the only tool for the job, whether to protect a … Read More
Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract The delivery of software is happening faster and faster. The use of microservices, agile development, CI/CD, and containers is changing the delivery time of software. At the same time, the number of software vulnerabilities is also growing. … Read More
Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract In this talk, Christopher Oster (Chief Software Systems Architect at Lutron Electronics) will provide a deep dive into the challenges and architectural considerations required to build a highly secure, responsive and scalable IoT cloud connecting a million … Read More
In this session we will walk through the steps required to securely communicate with your device using the Device Shadow service. This will include an overview of user authentication and authorization, connecting to AWS IoT, and using MQTT to communicate with the device’s “Device Shadow” to read and update its state. All this, using the AWS Amplify CLI and SDK.
This presentation will take you through the biggest areas where you need to focus your efforts in order to keep your data safe at AWS, and will show some real-life examples of what could go wrong if you make compromises or allow bad practices.
This presentation will take you through the biggest areas where you need to focus your efforts in order to keep your data safe in AWS, and will show some real-life examples of what could go wrong if you make compromises or allow bad practices.
Abstract Many believe that better security comes from robust independent gating, but DevOps has proven that you can safely deploy orders of magnitude faster without human gating. Comcast uses a DevSecOps approach which focuses on automation, speed and team ownership of end-to-end product security lifecycle. It’s agile and developer-focused. It’s about building security in rather … Read More