Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.
“Security” can be a daunting, scary, and (frankly) quite often a very boring topic. BUT!, we promise that this Community Call on May 7th will be informative, engaging, and enlightening (or, at least not boring)!
Applying security best practices is essential not only for developers or sensitive data storage but also for the everyday R user installing R packages, contributing to open source, working with APIs or remote servers. However, keeping up-to-date with security best practices and applying them meticulously requires significant effort and is difficult without expert knowledge. On this Call you’ll hear about how the ropsec
package can help you and you’ll learn the inner secrets of maintaining confidentiality, integrity, and availability throughout all your data science workflows.
100% of the contributors to this post agree this is a “must attend” event.
Agenda
- Stefanie Butland – Welcome (3 min)
- Bob Rudis – Zen and the art of ensuring confidentiality & integrity in analytics workflows (20 min)
- Ildi Czeller – Authorization vs authentication explained through signing commits: why you should do it and how
ropsec
helps you do it the right way (15 min) - Q & A (20 min)
???? See speaker bios below.
Join the Call
???? Tuesday, May 7th, 11 AM PDT (find your timezone)
☎️ Find details for joining on our Community Calls page. Everyone is welcome. No RSVP needed.
???? After the Call, we’ll post the video and notes from the Q & A.
What do YOU want to know about security for R? Tell us in the comments below.
Resources
R-centric
notary
– Signing & Verification of R Packages- rOpenSci unconf18 security projects: middlechild, defender, ropsec, keybase
- CRAN Mirror “Security”
- On Watering Holes, Trust, Defensible Systems and Data Science Community Security
Broader dev/datasci ecosystem
- It’s a FAKE (?)! Revisiting Trust In FOSS Ecosystems
- Keybase launches encrypted git
- Set up Keybase.io, GPG & Git to sign commits on GitHub
- An Introduction to Managing Secrets Safely with Version Control Systems
- 10 GitHub Security Best Practices (direct PDF link)
- How to set up two-factor authentication on all your online accounts
- Top 20 OpenSSH Server Best Security Practices
- Browse Privately. Explore Freely. Defend yourself against tracking and surveillance. Circumvent censorship. (Tor project)
Speakers
Ildi on GitHub, Twitter, Website
Bob on GitHub, Twitter, Website
R-bloggers.com offers daily e-mail updates about R news and tutorials about learning R and many other topics. Click here if you're looking to post or find an R/data-science job.
Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.