backend security series

Cossack Labs Blog

20 Nov 2019

What Should You Drop When You Lift and Shift

When moving to cloud, your threat model changes. Learn how to reallocate your security efforts effectively.

Read more...


4 Apr 2019

Building Defence in Depth for Your Data Using Acra

How to protect the data in your app infrastructure using the defence in depth approach, explained on the example of Acra encryption suite.

Read more...


13 Feb 2019

Preventing SQL Injections When WAF’s Not Enough

Using SQL firewall to protect database against SQL injections at scale as compared to WAF.

Read more...


13 Dec 2016

12 and 1 ideas on how to enhance backend data security

Previously, we’ve talked about classic design patterns in backend data security and about key management goals and techniques. In this article, we'll discuss how modern approaches differ and shed light on our solutions. Updated in 2019

Read more...


21 Sep 2016

Backend data security: Key management 101

Second article in series, Key Management 101 will talk about basic key management concepts, goals and methods to achieve them. 

Read more...


15 Aug 2016

Classic Backend Security Design Patterns

In the upcoming series of articles, we'll ascend from classic database security techniques to the modern technologies, including some cutting edge research data and our own experiments.

Read more...

All posts

Previous Previous