COSSACK LABS | applied security

applied security

Mar 23, 2021

Cloud security: gaps in a "shared responsibility" model

Oct 22, 2020

React Native security: things to keep in mind

Sep 14, 2020

Security logs: cryptographically signed audit logging for data protection

Jun 10, 2020

Swift Way to Build OpenSSL for Carthage iOS, As We Did It for Themis

Nov 20, 2019

What Should You Drop When You Lift and Shift

Oct 28, 2019

Security Engineering Advice: 4 Ways to Prepare for Security Incidents

Sep 5, 2019

Implementing End-to-End encryption in Bear App

May 7, 2019

Install Acra 1-Click App through DigitalOcean Marketplace

Apr 4, 2019

Building Defence in Depth for Your Data Using Acra

Feb 13, 2019

Preventing SQL Injections When WAF’s Not Enough

Jan 22, 2019

On Blockchain and GDPR

Sep 20, 2018

GDPR for Engineers: Implementing Rights and Security Demands

Aug 16, 2018

Poison Records in Acra – Database Honeypots for Intrusion Detection

Dec 13, 2016

12 and 1 ideas on how to enhance backend data security

Oct 26, 2016

Why making Internet safe is everyone’s responsibility

Sep 21, 2016

Backend data security: Key management 101

Aug 15, 2016

Classic Backend Security Design Patterns

Jul 27, 2016

Zero Knowledge Protocols without magic

Jul 20, 2016

Perimeter security: avoiding disappointment, shame and despair

May 23, 2016

Choose your Android crypto (Infographic)

Mar 30, 2016

Crypto in iOS: Choose your destiny (Infographic)

Mar 3, 2016

What's wrong with Web Cryptography

Nov 26, 2015

Why we need novel authentication schemes?

Oct 28, 2015

Why you should avoid SSL for your next application

Contact us