Even if your cloud infrastructure is configured securely, how can you make sure cloud applications do not introduce vulnerabilities? This technical session for cloud security professionals focuses on shift-left security practices, including the latest strategies for building secure applications, achieving code-to-cloud traceability of code-related issues, and getting AI-generated remediations that make it easy for application development teams to fix issues at the source.
talk-data.com
Speaker
Rahul Gupta
6
talks
Frequent Collaborators
Filter by Event / Source
Talks & appearances
6 activities · Newest first
Which software vulnerabilities in my cloud environment pose the greatest risk, and how do I fix them quickly? What’s the best way to prevent over-permissioned identities from leading to unauthorized cloud access? Join this technical session and learn how new vulnerability response and cloud identity and entitlement management capabilities in Security Command Center can help strengthen your overall risk posture.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.
X509 certificates and Google Cloud Certificate Authority Service offer powerful authentication solutions for workloads, micro-services, and smart devices. This session will guide you through the latest innovations in certificate provisioning and management for VMs, Kubernetes, and Load Balancers. We'll delve into SPIFFE, mTLS, and service-to-service authentication techniques. Gain real-world insights from Signify (formerly Philips Lighting) and see how they've implemented Google Cloud Certificate Authority Service and the Matter standard within their IoT ecosystem.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.
Message Queuing Telemetry Transport (MQTT) is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.
IBM® MessageSight is an appliance-based messaging server that is optimized to address the massive scale requirements of machine-to-machine (m2m) and mobile user scenarios. IBM MessageSight makes it easy to connect mobile customers to your existing messaging enterprise system, enabling a substantial number of remote clients to be concurrently connected. The MQTT protocol is a lightweight messaging protocol that uses publish/subscribe architecture to deliver messages over low bandwidth or unreliable networks. A publish/subscribe architecture works well for HTML5, native, and hybrid mobile applications by removing the wait time of a request/response model. This creates a better, richer user experience. The MQTT protocol is simple, which results in a client library with a low footprint. MQTT was proposed as an Organization for the Advancement of Structured Information Standards (OASIS) standard. This book provides information about version 3.1 of the MQTT specification. This IBM Redbooks® publication provides information about how IBM MessageSight, in combination with MQTT, facilitates the expansion of enterprise systems to include mobile devices and m2m communications. This book also outlines how to connect IBM MessageSight to an existing infrastructure, either through the use of IBM WebSphere® MQ connectivity or the IBM Integration Bus (formerly known as WebSphere Message Broker). This book describes IBM MessageSight product features and facilities that are relevant to technical personnel, such as system architects, to help them make informed design decisions regarding the integration of the messaging appliance into their enterprise architecture. Using a scenario-based approach, you learn how to develop a mobile application, and how to integrate IBM MessageSight with other IBM products. This publication is intended to be of use to a wide-ranging audience.
Across numerous vertical industries, enterprises are challenged to improve processing efficiency as transactions flow from their business communities to their internal systems and vice versa, simplify management and expansion of the external communities, accommodate customer and supplier preferences, govern the flow of information, enforce policy and standards, and protect sensitive information. Throughout this process, external partners must be on-boarded and off-boarded, information must flow across multiple communications infrastructures, and data must be mapped and transformed for consumption across multiple applications. Some transactions require synchronous or real-time processing while others are of a more periodic nature. For some classes of customer or supplier, the enterprise might prefer a locally-managed, on-premise solution. For some types of communities (often small businesses), an as-a-Service solution might be the best option. Many large enterprises combine the on-premise and as-a-Service approach to serve different categories of business partners (customers or suppliers). This IBM® Redbooks® publication focuses on solutions for end-to-end integration in complex value chains and presents several end-to-end common integration scenarios with IBM Sterling and IBM WebSphere® portfolios. We believe that this publication will be a reference for IT Specialists and IT Architects implementing an integration solution architecture involving IBM Sterling and IBM WebSphere portfolios. Please note that the additional material referenced in the text is not available from IBM.