security

Amplify your Mobile App – IoT on AWS – A Philly Cloud Computing Event

In this session we will walk through the steps required to securely communicate with your device using the Device Shadow service. This will include an overview of user authentication and authorization, connecting to AWS IoT, and using MQTT to communicate with the device’s “Device Shadow” to read and update its state. All this, using the … Read More

IoT on AWS – Cyber Solutions’ Steve Pressman on Data Protection and Cloud Security

Storing your data in AWS can be the best decision you ever make, or the worst nightmare you can fathom. It all depends on the decisions you make at the design and implementation phases of your project and the diligence you apply throughout your development and operations cycles. This presentation will take you through the biggest areas where you need to focus your efforts in order to keep your data safe at AWS, and will show some real-life examples of what could go wrong if you make compromises or allow bad practices

By Steve Pressman, President & Chief Solutions Architect at Alpine Cyber Solutions

Philly ETE 2019 – Noopur Davis – Building Security In: DevSecOps

Abstract Many believe that better security comes from robust independent gating, but DevOps has proven that you can safely deploy orders of magnitude faster without human gating. Comcast uses a DevSecOps approach which focuses on automation, speed and team ownership of end-to-end product security lifecycle. It’s agile and developer-focused. It’s about building security in rather … Read More

Philly ETE 2016 #35 – Jean Yang – Securing Software by Construction

This talk has two parts. First, I will present technical ideas from research, including my own, that help secure software by construction. Even though these are reasonable ideas, however, the gap between academia and industry often prevents these ideas from becoming realized in practice. Second, I will discuss what prevents longer-term security solutions from being commercialized, how we started the Cybersecurity Factory accelerator bridge the research/industry gap, and how we can work together to address the issues that remain.

DevNews #59 – Bugs made of paper and graphine transistors – does the NSA know?

YEAH! Integrating yeoman-style projects into a larger maven build – Addy Osmani comes up with the goods. Making Maven Grunt We buried the lead – NSA can get to everything Joel brings up the counter-point, an article by ARS. Vertx 2.0 Q&A on InfoQ w/Tim Fox – As per last week’s episode, Vert.X is an … Read More

Chariot DevNews Episode #50 – Phones hacked, security and passwords, and more

It’s our 50th episode! More to come, now weekly. Send us feedback on @techcast. Topics ARS – You can crack iPhone auto-generated hotspot passwords in seconds – http://arstechnica.com/security/2013/06/new-attack-cracks-iphone-autogenerated-hotspot-passwords-in-seconds/ Android phone #s breeched by Facebook app – http://www.darkreading.com/mobile/android-phone-numbers-leaked-by-facebook/240157723 – ARS – The more complex the rules, the more annoying, and is it really more effective than just a longer … Read More