InfoQ Homepage Security Content on InfoQ
-
Posted by
Stefania Chaplin
on
Sep 12, 2025
Secure by Design: Building Security into Engineering Workflows and Teams
Stefania Chaplin discusses how to build security into engineering workflows and teams. She shares how to achieve a security-first culture by focusing on people, processes, and technology.
on Sep 12, 2025Icon49:45 -
Posted by
Nivedita Murthy
on
Jul 16, 2025
Designing for Defense: Architecting APIs with Zero Trust Principles
Renato Losio and security experts discuss designing for defense and architecting APIs with Zero Trust principles, covering challenges, common vulnerabilities, and practical advice for developers.
on Jul 16, 2025Icon01:01:46 -
Posted by
Anna Berenberg
on
Jul 10, 2025
One Network: Cloud-Agnostic Service and Policy-Oriented Network Architecture
Anna Berenberg reveals Google's shift to One Network, streamlining diverse infrastructures to enhance developer velocity and policy management.
on Jul 10, 2025Icon44:42 -
Posted by
Dorota Parad
on
Jul 03, 2025
Security or Convenience - Why Not Both?
Dorota Parad discusses the BLISS framework for security, showing senior developers and leaders how to enhance security while boosting engineering productivity and minimizing operational friction.
on Jul 03, 2025Icon38:08 -
Posted by
Danielle Sudai
on
May 07, 2025
Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?
Danielle Sudai discusses Cloud Security Posture Management (CSPM), its lifecycle (inventory, scan, notify), and how it helps developers prevent cloud security incidents.
on May 07, 2025Icon36:29 -
Posted by
Kennedy Torkura
on
Apr 30, 2025
Cloud Attack Emulation: Leveraging the Attacker’s Advantage for Effective Defense
Kennedy Torkura discusses cloud attack emulation, the attacker's perspective, and threat-informed defense for stronger cloud security.
on Apr 30, 2025Icon47:54 -
Posted by
Stefania Chaplin
on
Apr 17, 2025
LLM and Generative AI for Sensitive Data - Navigating Security, Responsibility, and Pitfalls in Highly Regulated Industries
Stefania Chaplin and Azhir Mahmood discuss responsible, secure, and explainable AI in regulated industries. Learn MLOps, legislation, and future trends.
on Apr 17, 2025Icon43:50 -
Posted by
Mykhailo Brodskyi
on
Apr 09, 2025
Comprehensive Approaches to Software Supply Chain Security
Mykhailo Brodskyi discusses critical software supply chain security risk categories relevant to FinTech and explains effective mitigation strategies. Real case studies & demo included.
on Apr 09, 2025Icon50:10 -
Posted by
Khawaja Shams
on
Mar 14, 2025
Dare Mighty Things: What NASA's Endeavors Teach Us about the Power of Calculated RISCs
Khawaja Shams explores the essence of calculated risks, discussing why these risks are worth taking, how to identify and mitigate potential downsides, and the characteristics of good risks.
on Mar 14, 2025Icon42:55 -
Posted by
Ashish Rajan
on
Feb 25, 2025
A Zero Trust Future for Applications: Practical Implementation and Pitfalls
Ashish Rajan shares a practical guide to working on zero trust, exploring where it fails before it starts and where engineers should see quick wins. Surprisingly, the answer is not really DevSecOps.
on Feb 25, 2025Icon46:00 -
Posted by
Adrian Gonzalez-Martin
on
Feb 20, 2025
Flawed ML Security: Mitigating Security Vulnerabilities in Data & Machine Learning Infrastructure with MLSecOps
Adrian Gonzalez-Martin introduces the motivations and the importance of security in data & ML infrastructure through a set of practical examples showcasing "Flawed Machine Learning Security".
on Feb 20, 2025Icon40:01 -
Posted by
Michael Friedrich
on
Feb 11, 2025
Efficient DevSecOps Workflows with a Little Help from AI
Michael Friedrich tells a story about experienced pain points, wasted hours debugging and solving, and learning how a little help from AI makes DevSecOps workflows efficient again.
on Feb 11, 2025Icon48:43