Building SQL firewall: insights from developers
Search over encrypted records: from academic dreams to production-ready tool
"Defense in depth": trench warfare principles for building secure distributed applications
Delivering security products without shooting yourself in the foot
Teach your application eloquence. Logs, metrics, traces.
Data encryption for Ruby web applications