Software security is becoming crucial nowadays, as the world is becoming more and more dependent on software. Bárbara Vieira and Theodoor Scholte are talking at Voxxed Days Athens about software security: we asked them what to watch out for.   What are the most common security pitfalls when developing a web application? Although the world […]

Read more

Security expert and Mozilla Tech Speaker Sumanth Damarla is talking at Voxxed Days Bristol about building Web Security Awareness. We caught up with him to get an idea of the threats to web security in 2017, and how to test and guard against them.   What are the top 5 threats to web security in 2017? […]

Read more

This is number seven of the Java 9 series: articles looking at some of the JDK Enhancement Proposals (JEPS) hoping to make their way into Java 9. Last week we looked at Variable Handles, and touched upon JEP 260. This week will take a more in-depth look at JEP 260: Encapsulate Most Internal APIs. This proposes […]

Read more

Yesterday it was announced that Java SE 8u111 (SE 8 update 111) and Java SE 8u112 are available, and “Oracle strongly recommends that most Java SE users upgrade to the latest Java 8 update, which includes important security fixes.” See the October Advisory on security from Oracle. Java SE 8u111 is a critical patch update (CPU), and Java […]

Read more

Security Beyond the Libraries Security is now important to all of us, not just people who work at Facebook, but it is a complicated domain with a lot of concepts to understand. In any technical ecosystem there is a blizzard of security technology as well as the generic concepts like keys, roles, certificates, trust, signing […]

Read more

DEF CON is one of the most controversial conferences in the world. Only at that annual event have arrests been made, legal threats shut down presentations and zero-day attacks been anted in Texas Hold ’em games. The Usual Suspects This is a conference of people who grew up like me—people who, at 11 years old, […]

Read more

During the last couple of months I have been discussing OAuth2 usage in enterprises with a few friends and developers at our local meetups. People clearly understand the basic concepts behind it. They use it to login with their gmail, twitter or facebook accounts on third party websites. So they have an idea, but … […]

Read more

Imagine this scenario: you wake up one morning and brew yourself a fresh, pod-based coffee. While basking in the decadence of your velvety beverage you glance back into the cupboard. A harsh reality dawns: you are running low on pods. This is no ordinary coffee. You cannot simply leave the house to restock the cupboards with […]

Read more

An interview with Paula Thrasher, Application Delivery Lead at CSC and DevOps pioneer in government circles on how to combat inefficiencies.  I recently caught up with Paula Thrasher, Application Delivery Lead at CSC and DevOps pioneer in government circles. In our conversation, we discussed a number of important topics including cross-functional teams, software supply chains, […]

Read more

“A lot of things are happening on the internet that you don’t know about”:  Serge Huber (@sergehuber) talks about the battle for privacy in the age of the internet, and the insidious issue of social engineering online. Filmed at Devoxx France 2016.

Read more