23 Mar 2021
"Cloud is secure"–is a mistaken belief: deploying an app to a cloud sounds like "risk outsourcing", while in reality, it's more like "risk sharing". In this article, we observe the security responsibility of cloud providers: where it ends, what are the gaps and grey areas, and what risks security teams should take into account when using "as a service" platforms.
22 Oct 2020
In this article, we shed light on React Native apps’ security based on our experience and explain some risks, and threats developers should address to prevent typical mistakes.
14 Sep 2020
We cover cryptographically signed audit logging, when logs are generated in a certain way which prevents tampering messages, removing, adding or changing the order of log entries. We explain why signed logs are essential for security software, how we’ve built-in secure audit logging in Acra, and how to use it together with other defense in-depth layers in your systems.
10 Jun 2020
This story is dedicated to fellow developers struggling with updating Carthage package with the latest OpenSSL for iOS and macOS apps. Here you will find the scripts, error messages, testing matrix, and our working solution for Themis to this no small feat. We believe it could save you time then you meet the same task.
2 Apr 2020
What data is sensitive and needs to be encrypted according to the modern data privacy regulations like GDPR, CCPA, HIPAA, FFIEC, etc.? This is a cheat sheet and an explanation of how we approach answering these questions.
20 Nov 2019
When moving to cloud, your threat model changes. Learn how to reallocate your security efforts effectively.
28 Oct 2019
Don't be afraid of security incidents, prepare to them in advance. Choose the scenario that suits your company and fits your budget.
5 Sep 2019
How we helped the Bear note taking app for iOS/macOS, which decided to implement note encryption for their huge existing user base. A story about finding a balance between usability, security, and mobile platforms' restrictions.
7 May 2019
Step-by-step installation and configuration tutorial.
4 Apr 2019
How to protect the data in your app infrastructure using the defence in depth approach, explained on the example of Acra encryption suite.