16 Aug 2018
How we detect massive data leaks and firewall exfiltration in Acra.
13 Dec 2016
Previously, we’ve talked about classic design patterns in backend data security, then about key management goals and techniques. In the last article, we will discuss how modern approaches differ and shed light on our solutions.
26 Oct 2016
... not the security vendors, nor government or big corporations can solely fix the current state of things. It's everybody's duty and the earlier we understand it - the better.
21 Sep 2016
Second article in series, Key Management 101 will talk about basic key management concepts, goals and methods to achieve them.
15 Aug 2016
In the upcoming series of articles, we'll ascend from classic database security techniques to the modern technologies, including some cutting edge research data and our own experiments.