security

Philly ETE 2020 – Rob Napier – Secrets and Lies

Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract “Security though obscurity is no security.” Well… sort of. The truth is much more complicated. Obfuscation is difficult, fragile, and a never ending battle. But sometimes it’s the only tool for the job, whether to protect a … Read More

Philly ETE 2020 – Christopher Oster – Powering Smart Homes at Scale

Check out our YouTube playlist to watch all the talks from Emerging Technologies for the Enterprise 2020. Abstract In this talk, Christopher Oster (Chief Software Systems Architect at Lutron Electronics) will provide a deep dive into the challenges and architectural considerations required to build a highly secure, responsive and scalable IoT cloud connecting a million … Read More

Amplify your Mobile App – IoT on AWS – A Philly Cloud Computing Event

In this session we will walk through the steps required to securely communicate with your device using the Device Shadow service. This will include an overview of user authentication and authorization, connecting to AWS IoT, and using MQTT to communicate with the device’s “Device Shadow” to read and update its state. All this, using the AWS Amplify CLI and SDK.

Philly ETE 2019 – Noopur Davis – Building Security In: DevSecOps

Abstract Many believe that better security comes from robust independent gating, but DevOps has proven that you can safely deploy orders of magnitude faster without human gating. Comcast uses a DevSecOps approach which focuses on automation, speed and team ownership of end-to-end product security lifecycle. It’s agile and developer-focused. It’s about building security in rather … Read More

Philly ETE 2016 #35 – Jean Yang – Securing Software by Construction

This talk has two parts. First, I will present technical ideas from research, including my own, that help secure software by construction. Even though these are reasonable ideas, however, the gap between academia and industry often prevents these ideas from becoming realized in practice. Second, I will discuss what prevents longer-term security solutions from being commercialized, how we started the Cybersecurity Factory accelerator bridge the research/industry gap, and how we can work together to address the issues that remain.