Security

This collections includes 197 articles published between 1997 and 2024.

(stats / articles)




2024 (6)

2024
SE Radio 642: Simon Wijckmans on Third Party Browser Script Security
SE Radio Podcasts (FREE) 2024

Simon Wijckmans, founder of c/side -- a company that focuses on monitoring, securing, and optimizing third-party JavaScript -- joins SE Radio host <a href…

2024
SE Radio 640: Jonathan Horvath on Physical Security
SE Radio Podcasts (FREE) 2024

Jonathan Horvath of <a class"css-1rn59kg" title"https://z-bitco.com" href"https://z-bitco.com/" data-testid"link-with-safety"…

2024
SE Radio 613: Shahar Binyamin on GraphQL Security
SE Radio Podcasts (FREE) 2024

Shahar Binyamin, CEO and co-founder of Inigo, joins host Priyanka Raghavan to discuss GraphQL security.

2024
2024
2024

2023 (27)

2023
SE Radio 584: Charles Weir on Ruthless Security for Busy Developers
SE Radio Podcasts (FREE) 2023

Charles Weirdeveloper, security researcher, and Research Fellow at Security Lancasterjoins host <a href…

2023
SE Radio 578: Ori Mankali on Secrets Management using Distributed Fragments Cryptography
SE Radio Podcasts (FREE) 2023

In this episode, Ori Mankali, senior VP of engineering at cloud security startup Akeyless, speaks with SE Radios <a href…

2023
SE Radio 575: Nir Valtman on Pipelineless Security
SE Radio Podcasts (FREE) 2023

Nir Valtman, co-Founder and CEO at Arnica, discusses pipelineless security with SE Radio host <a href…

2023
SE Radio 568: Simon Bennetts on OWASP Dynamic Application Security Testing Tool ZAP
SE Radio Podcasts (FREE) 2023

Simon Bennetts, a distinguished engineer at Jit, discusses one of the flagship projects of OWASP: the Zed Attack Proxy ZAP open…

2023
2023
2023
2023
2023
2023
Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification
IEEE Software 2023 (1); by Ana Cristina Franco da Silva, Eddie Lazebnik, Eyal Traitel
2023
Why Security Initiatives Are Doomed to Fail & What You Can Do About It
GOTO Conference Videos (FREE) 2023; by Josh Armitage
2023
The One Where We Threat Model During Development in 2 Minutes
GOTO Conference Videos (FREE) 2023; by Izar Tarandach
2023
Security By Design
GOTO Conference Videos (FREE) 2023; by Ana Oprea
2023
Decoding Modern Tech: Cloud, APIs, Wasm, Security, & More
GOTO Conference Videos (FREE) 2023; by Daniel Bryant, Matt Turner
2023
The One Where We Threat Model During Development
GOTO Conference Videos (FREE) 2023; by Izar Tarandach
2023
OAuth in 5 Minutes
GOTO Conference Videos (FREE) 2023; by Aaron Parecki
2023
Protect Your Code with GitHub Security Features in 5 Minutes
GOTO Conference Videos (FREE) 2023; by Rob Bos
2023
Concurrency Abstractions for Application Security
GOTO Conference Videos (FREE) 2023; by Bram Verburg
2023
Practical Magic: The Resilience Potion & Security Chaos Engineering
GOTO Conference Videos (FREE) 2023; by Kelly Shortridge
2023
Privacy, Crime, National Security, Human Rights & You in the Middle
GOTO Conference Videos (FREE) 2023; by Bert Hubert
2023
Protect Your Code with GitHub Security Features
GOTO Conference Videos (FREE) 2023; by Rob Bos
2023
The Current State of Cyber Security
GOTO Conference Videos (FREE) 2023; by Eleanor Saitta, Aino Vonge Corry
2023
Expert Talk: Software Security
GOTO Conference Videos (FREE) 2023; by Jim Manico, John Steven
2023
Security Chaos Engineering
GOTO Conference Videos (FREE) 2023; by Kelly Shortridge, Aaron Rinehart, Mark Miller
2023
Java Security & the Java Ecosystem
GOTO Conference Videos (FREE) 2023; by Nicolas Frankel, Preben Thor
2023
Container Security
GOTO Conference Videos (FREE) 2023; by Liz Rice, Eoin Woods
2023
The Secrets of Advanced OAuth 2.0
GOTO Conference Videos (FREE) 2023; by Aaron Parecki, Eric Johnson

2022 (10)

2022
OSS Supply-chain Security: What Will It Take?
ACM queue (FREE) 2022 (5); by Maya Kaczorowski, Falcon Momot, Chris McCubbin
2022
2022
2022
The Current State of Cyber Security
GOTO Conference Videos (FREE) 2022; by Eleanor Saitta, Aino Vonge Corry
2022
Security Styles
GOTO Conference Videos (FREE) 2022; by Eleanor Saitta
2022
Triaging Real Time Security Threats with eBPF Powered Observability
GOTO Conference Videos (FREE) 2022; by Daniel Kim
2022
ML Security Operations at One of the Largest Brewing Companies
GOTO Conference Videos (FREE) 2022; by Maurits van der Goes
2022
Security Chaos Engineering
GOTO Conference Videos (FREE) 2022; by Kelly Shortridge, Aaron Rinehart, Mark Miller
2022
Bridging Cyber Security: Detectify
GOTO Conference Videos (FREE) 2022; by Rickard Carlsson, Jrn Larsen
2022
Expert Talk: Software Security
GOTO Conference Videos (FREE) 2022; by Jim Manico, John Steven

2021 (13)

2021
Episode 467 Kim Carter on Dynamic Application Security Testing
SE Radio Podcasts (FREE) 2021

Kim Carter of BinaryMist discusses Dynamic Application Security Testing DAST and how the OWASP purpleteam project can improve early defect detection.

2021
2021
Episode 467 Kim Carter on Dynamic Application Security Testing
SE Radio Podcasts (FREE) 2021

Kim Carter of BinaryMist discusses Dynamic Application Security Testing DAST and how the OWASP purpleteam project can improve early defect detection.

2021
2021
2021
Fireside Chat About OAuth 2.0
GOTO Conference Videos (FREE) 2021; by Aaron Parecki, Eric Johnson
2021
Security Chaos Engineering - Winning at Security “Whack-a-Mole”
GOTO Conference Videos (FREE) 2021; by Aaron Rinehart
2021
Security Chaos Engineering: From Theory to Practice
GOTO Conference Videos (FREE) 2021; by Jamie Dicken
2021
Embarking on Your Security Journey
GOTO Conference Videos (FREE) 2021; by Seth Vargo
2021
Risks in Systems Design: Chaos Engineering in Apps & Cloud Security
GOTO Conference Videos (FREE) 2021; by Crystal Hirschorn
2021
Serverless Security: New Risks Require New Approaches
GOTO Conference Videos (FREE) 2021; by Itay Rozenman
2021
Spring Cloud Gateway: Resilience and Security
GOTO Conference Videos (FREE) 2021; by Thomas Vitale
2021
Java Security & the Java Ecosystem
GOTO Conference Videos (FREE) 2021; by Nicolas Frankel

2020 (25)

2020
A Guide to Threat Modelling for Developers
Martin Fowler (FREE) 2020; by Jim Gumbley

This article provides clear and simple steps to help teams that want to adopt threat modelling.

2020
2020
416: Adam Shostack on Threat Modeling
SE Radio Podcasts (FREE) 2020
2020
Episode 404: Bert Hubert on DNS Security
SE Radio Podcasts (FREE) 2020

Bert Hubert, author of the open source PowerDNS nameserver discusses DNS security and all aspects of the Domain Name System with its flaws and history.

2020
Episode 395: Katharine Jarmul on Security and Privacy in Machine Learning
SE Radio Podcasts (FREE) 2020

Katharine Jarmul of DropoutLabs discusses security and privacy concerns as they relate to Machine Learning.

2020
2020
416: Adam Shostack on Threat Modeling
SE Radio Podcasts (FREE) 2020
2020
Episode 404: Bert Hubert on DNS Security
SE Radio Podcasts (FREE) 2020

Bert Hubert, author of the open source PowerDNS nameserver discusses DNS security and all aspects of the Domain Name System with its flaws and history.

2020
Episode 395: Katharine Jarmul on Security and Privacy in Machine Learning
SE Radio Podcasts (FREE) 2020

Katharine Jarmul of DropoutLabs discusses security and privacy concerns as they relate to Machine Learning.

2020
Adam Shostack on Threat Modeling
IEEE Software 2020 (6)
2020
2020
The Die is Cast: Hardware Security is Not Assured
ACM queue (FREE) 2020 (4); by Edlyn V. Levine
2020
2020
Conference Highlights: JIT Fault Prevention, Motivated Modeling, Security in Requirements, and Improving Team Performance
IEEE Software 2020 (4); by Jeffrey C. Carver, Ricardo Colomo Palacios, Xabier Larrucea
2020
Security Test
IEEE Software 2020 (2); by Youssef Rekik, Rahul Karade
2020
2020
Justin Richer on OAuth
IEEE Software 2020 (1)
2020
Container Security
GOTO Conference Videos (FREE) 2020; by Liz Rice, Eoin Woods
2020
Are You Keeping Hosts Up to Date with the Latest Security Releases? (Q4)
GOTO Conference Videos (FREE) 2020; by Liz Rice
2020
Advanced OAuth and Pitfalls Part 2/2
GOTO Conference Videos (FREE) 2020; by Aaron Parecki, Eric Johnson
2020
The Secrets of OAuth 2.0 Part 1/2
GOTO Conference Videos (FREE) 2020; by Aaron Parecki, Eric Johnson
2020
OAuth and OpenID Connect in Plain English
GOTO Conference Videos (FREE) 2020; by Nate Barbettini
2020
How to Hack OAuth
GOTO Conference Videos (FREE) 2020; by Aaron Parecki
2020
Application Security at High Velocity
GOTO Conference Videos (FREE) 2020; by Francis Potter
2020
Practical End-to-End Container Security at Scale
GOTO Conference Videos (FREE) 2020; by Yashvier Kosaraju

2019 (12)

2019
2019
2019
Episode 378: Joshua Davies on Attacking and Securing PKI
SE Radio Podcasts (FREE) 2019

Joshua Davies discusses TLS, PKI vulnerabilities in the PKI, and the evolution of the PKI to make it more secure, with host Robert Blumen.

2019
2019
2019
Episode 378: Joshua Davies on Attacking and Securing PKI
SE Radio Podcasts (FREE) 2019

Joshua Davies discusses TLS, PKI vulnerabilities in the PKI, and the evolution of the PKI to make it more secure, with host Robert Blumen.

2019
2019
The Future of Security
GOTO Conference Videos (FREE) 2019; by Zo Rose
2019
OAuth Tokens As Your Identity API
GOTO Conference Videos (FREE) 2019; by Jacob Ideskog
2019
Taking Security Seriously
GOTO Conference Videos (FREE) 2019; by Michael Brunton-Spall
2019
Common API Security Pitfalls
GOTO Conference Videos (FREE) 2019; by Philippe De Ryck
2019
Taking Security Seriously
GOTO Conference Videos (FREE) 2019; by Philippe De Ryck

2018 (18)

2018
SE Radio Episode 330: Natalie Silvanovich on Attack Surface Reduction
SE Radio Podcasts (FREE) 2018

Natalie Silvanovich and Kim Carter discuss reducing the attack surface of the software that Engineers are creating today.

2018
SE Radio Episode 321: Péter Budai on End to End Encryption
SE Radio Podcasts (FREE) 2018

Pter Budai and Kim Carter discuss End to End Encryption E2EE, backdoors, the scenarios where E2EE can be and should be used.

2018
SE Radio Episode 314: Scott Piper on Cloud Security
SE Radio Podcasts (FREE) 2018

Scott Piper and Kim Carter discuss Cloud Security.

2018
SE Radio Episode 330: Natalie Silvanovich on Attack Surface Reduction
SE Radio Podcasts (FREE) 2018

Natalie Silvanovich and Kim Carter discuss reducing the attack surface of the software that Engineers are creating today.

2018
SE Radio Episode 321: Péter Budai on End to End Encryption
SE Radio Podcasts (FREE) 2018

Pter Budai and Kim Carter discuss End to End Encryption E2EE, backdoors, the scenarios where E2EE can be and should be used.

2018
SE Radio Episode 314: Scott Piper on Cloud Security
SE Radio Podcasts (FREE) 2018

Scott Piper and Kim Carter discuss Cloud Security.

2018
Security for the Modern Age
ACM queue (FREE) 2018 (5); by Jessie Frazelle
2018
Engineering Security Vulnerability Prevention, Detection, and Response
IEEE Software 2018 (5); by Laurie A. Williams, Gary McGraw, Sammy Migues
2018
Recent Progress in Software Security
IEEE Software 2018 (2); by Edward Amoroso
2018
Software Safety and Security Risk Mitigation in Cyber-physical Systems
IEEE Software 2018 (1); by Johannes Sametinger, Remzi Seker
2018
Content Security Policies: Let's Break Stuff
GOTO Conference Videos (FREE) 2018; by Matt Brunt
2018
Securing APIs & Microservices with OAuth & OpenID Connect
GOTO Conference Videos (FREE) 2018; by Travis Spencer
2018
Putting Your Security on the Wire
GOTO Conference Videos (FREE) 2018; by Damien Murphy
2018
Introduction to OAuth 2.0 and OpenID Connect
GOTO Conference Videos (FREE) 2018; by Philippe De Ryck
2018
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
GOTO Conference Videos (FREE) 2018; by Mark West
2018
Security & Trust in a Microservices World
GOTO Conference Videos (FREE) 2018; by Aaron Bedra
2018
The Evolution of Threat Models for Secure Communication Products
GOTO Conference Videos (FREE) 2018; by Phil Zimmermann
2018
Navigating Cyber Security in a Cloud Landscape
GOTO Conference Videos (FREE) 2018; by Richard Miller

2017 (17)

2017
The Basics of Web Application Security
Martin Fowler (FREE) 2017; by Martin Fowler

Security is both very important and often under-emphasized.

2017
SE Radio Episode 311: Armon Dadgar on Secrets Management
SE Radio Podcasts (FREE) 2017

Armon Dadgar speaks to Matthew Farwell about Secrets Management.

2017
2017
SE Radio Episode 302: Haroon Meer on Network Security
SE Radio Podcasts (FREE) 2017

Founder of Thinkst, Haroon Meer talks with Kim Carter about Network Security.

2017
SE Radio Episode 290: Diogo Mónica on Docker Security
SE Radio Podcasts (FREE) 2017

Docker Security Team lead Diogo Mnica talks with SE Radios Kim Carter about Docker Security aspects.

2017
SE Radio Episode 311: Armon Dadgar on Secrets Management
SE Radio Podcasts (FREE) 2017

Armon Dadgar speaks to Matthew Farwell about Secrets Management.

2017
2017
SE Radio Episode 302: Haroon Meer on Network Security
SE Radio Podcasts (FREE) 2017

Founder of Thinkst, Haroon Meer talks with Kim Carter about Network Security.

2017
SE Radio Episode 290: Diogo Mónica on Docker Security
SE Radio Podcasts (FREE) 2017

Docker Security Team lead Diogo Mnica talks with SE Radios Kim Carter about Docker Security aspects.

2017
Reducing the Attack Surface
ACM queue (FREE) 2017 (5)
2017
Web App Security: A Comparison and Categorization of Testing Frameworks
IEEE Software 2017 (1); by Satish Mahadevan Srinivasan, Raghvinder S. Sangwan
2017
Listening In: Cyber Security in an Insecure Age
GOTO Conference Videos (FREE) 2017; by Susan Landau
2017
Security in the Delivery Pipeline
GOTO Conference Videos (FREE) 2017; by James Wickett
2017
Building Layers of Defense with Spring Security
GOTO Conference Videos (FREE) 2017; by Joris Kuipers
2017
Automating Security & Compliance (for Fun & Profit)
GOTO Conference Videos (FREE) 2017; by Nicole Johnson
2017
The Current State of Automotive Security
GOTO Conference Videos (FREE) 2017; by Chris Valasek
2017
Adaptive Threat Modelling
GOTO Conference Videos (FREE) 2017; by Aaron Bedra

2016 (9)

2016
Research for Practice: Web Security and Mobile Web Computing
ACM queue (FREE) 2016 (4); by Jean Yang, Vijay Janapa Reddi, Yuhao Zhu, Peter Bailis
2016
Software Security, Privacy, and Dependability: Metrics and Measurement
IEEE Software 2016 (4); by George Hatzivasilis, Charalampos Manifavas
2016
More Encryption Means Less Privacy
ACM queue (FREE) 2016 (1); by Poul-Henning Kamp
2016
Secure Socks: Exploring Microservice Security in an Open Source Sock Shop
GOTO Conference Videos (FREE) 2016; by Phil Winder
2016
Secure by Design – the Architect's Guide to Security Design Principles
GOTO Conference Videos (FREE) 2016; by Eoin Woods
2016
Container & Microservice Security
GOTO Conference Videos (FREE) 2016; by Adrian Mouat
2016
Modding Security & Privacy
GOTO Conference Videos (FREE) 2016; by Barry Galster
2016
Docker Security
GOTO Conference Videos (FREE) 2016; by Adrian Mouat
2016
Practical Microservice Security
GOTO Conference Videos (FREE) 2016; by Laura Bell

2015 (10)

2015
Security and Privacy on the Web [Guest editors' introduction]
IEEE Software 2015 (4); by Larry Koved
2015
Insights in Container Security
GOTO Conference Videos (FREE) 2015; by Nils Magnus
2015
Docker Security
GOTO Conference Videos (FREE) 2015; by Adrian Mouat
2015
Rugged Building Materials & Creating Agility with Security
GOTO Conference Videos (FREE) 2015; by David Etue
2015
How to Effect Change in the Epistemological Wasteland of App Security
GOTO Conference Videos (FREE) 2015; by James Wickett
2015
When DevOps Meets Security
GOTO Conference Videos (FREE) 2015; by Michael Brunton-Spall
2015
The Android Security Jungle: Pitfalls, Threats & Survival Tips
GOTO Conference Videos (FREE) 2015; by Scott Alexander Bown
2015
Security Threats & Mitigations for iOS Developers
GOTO Conference Videos (FREE) 2015; by Emil Kvarnhammar
2015
End-to-end Encryption in Cloud Services
GOTO Conference Videos (FREE) 2015; by Patrick Linskey
2015
Shield your Cluster: Security & Elasticsearch
GOTO Conference Videos (FREE) 2015; by Alex Reelsen

2014 (3)

2014
2014
Privacy & Security, Policy & Technology
GOTO Conference Videos (FREE) 2014; by Tim Bray
2014
The Future of Security isn't Preventing Attacks
GOTO Conference Videos (FREE) 2014; by Aaron Bedra

2013 (2)

2013
More Encryption Is Not the Solution
ACM queue (FREE) 2013 (7); by Poul-Henning Kamp
2013

2012 (2)

2012
Browser Security Case Study: Appearances Can Be Deceiving
ACM queue (FREE) 2012 (11); by Jeremiah Grossman, Ben Livshits, Rebecca Gurley Bace
2012
SAGE: Whitebox Fuzzing for Security Testing
ACM queue (FREE) 2012 (1); by Patrice Godefroid, Michael Y. Levin, David A. Molnar

2011 (2)

2011
Java Security Architecture Revisited
ACM queue (FREE) 2011 (9); by Li Gong
2011
Technology Transfer: A Software Security Marketplace Case Study
IEEE Software 2011 (5); by Gary McGraw

2009 (6)

2009
Communications Surveillance: Privacy and Security at Risk
ACM queue (FREE) 2009 (8); by Whitfield Diffie, Susan Landau
2009
Episode 128: Web App Security with Bruce Sams
SE Radio Podcasts (FREE) 2009

The majority of hacker attacks 70 are directed at weaknesses that are the result of problems in the implementation and/or architecture of the application.

2009
Episode 128: Web App Security with Bruce Sams
SE Radio Podcasts (FREE) 2009

The majority of hacker attacks 70 are directed at weaknesses that are the result of problems in the implementation and/or architecture of the application.

2009
Browser Security: Lessons from Google Chrome
ACM queue (FREE) 2009 (5); by Charles Reis, Adam Barth, Carlos Pizano
2009
Job Security
IEEE Software 2009 (5)
2009
Security in the Browser
ACM queue (FREE) 2009 (2); by Thomas Wadlow, Vlad Gorelik

2008 (4)

2008
2008
Threat Modeling: Diving into the Deep End
IEEE Software 2008 (1); by Jeffrey A. Ingalsbe, Louis Kunimatsu, Tim Baeten
2008
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge
IEEE Software 2008 (1); by Konstantin Beznosov, Brian Chess
2008
Security Requirements for the Rest of Us: A Survey
IEEE Software 2008 (1); by Inger Anne Tøndel, Per Håkon Meland

2007 (6)

2007
2007
The Seven Deadly Sins of Linux Security
ACM queue (FREE) 2007 (4); by Bob Toxen
2007
Organizing Security Patterns
IEEE Software 2007 (4); by Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
2007
The evolution of security
ACM queue (FREE) 2007 (3); by Daniel E. Geer Jr.
2007
Episode 66: Gary McGraw on Security
SE Radio Podcasts (FREE) 2007

This episode features an interview with the software security expert Gary McGraw.

2007
Episode 66: Gary McGraw on Security
SE Radio Podcasts (FREE) 2007

This episode features an interview with the software security expert Gary McGraw.

2006 (5)

2006
2006
Pointless PKI
ACM queue (FREE) 2006 (6)
2006
2006
2006
Security and Software Quality: An Interview with Frank Perry
IEEE Software 2006 (3); by Jane Huffman Hayes, Nancy S. Eickelmann, Elizabeth Ashlee Holbrook

2005 (3)

2005
Security---problem solved?
ACM queue (FREE) 2005 (5); by John Viega
2005
Letters: Convenience vs. Security
IEEE Software 2005 (4)
2005
Review of "Network Security Architectures by Sean Convery"
ACM queue (FREE) 2005 (1); by Radu State

2004 (3)

2004
VoIP Security: Not an Afterthought
ACM queue (FREE) 2004 (6); by Tom D. Lookabaugh
2004
Security is Harder than You Think
ACM queue (FREE) 2004 (5); by John Viega, Matt Messier
2004
Security: The root of the Problem
ACM queue (FREE) 2004 (4); by Marcus J. Ranum

2003 (2)

2003
Reducing Internet-Based Intrusions: Effective Security Patch Management
IEEE Software 2003 (1); by Bill R. Brykczynski, Robert A. Small
2003
Security and Design
Martin Fowler (FREE) 2003; by Martin Fowler

a bliki entry for SecurityAndDesign

2002 (3)

2002
2002
Composing Security-Aware Software
IEEE Software 2002 (1); by Jun Han
2002
Improving Security Using Extensible Lightweight Static Analysis
IEEE Software 2002 (1); by David Evans, David Larochelle

2000 (4)

2000
Statically Scanning Java Code: Finding Security Vulnerabilities
IEEE Software 2000 (5); by John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
2000
Security Domains: Key Management in Large-Scale Systems
IEEE Software 2000 (5); by John R. Michener, Tolga Acar
2000
Remediation of Application-Specific Security Vulnerabilities at Runtime
IEEE Software 2000 (5); by Thomas F. Bowen, Mark E. Segal
2000
Roundtable on Information Security Policy
IEEE Software 2000 (5); by Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall

1999 (1)

1999
Software Security in an Internet World: An Executive Summary
IEEE Software 1999 (4); by Timothy J. Shimeall, John J. McDermott

1998 (1)

1998
Computer Security Research: A British Perspective
IEEE Software 1998 (5); by Bruce H. Barnes

1997 (3)

1997
A Flexible Security System for Using Internet Content
IEEE Software 1997 (5); by Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao
1997
Guest Editors' Introduction: Security and Privacy: Promising Advances
IEEE Software 1997 (5); by Charles P. Pfleeger, Deborah M. Cooper
1997
Quality Time: The Fundamentals of Information Security
IEEE Software 1997 (1); by Charles P. Pfleger