San Francisco, CA, USA
Jul 9, 2020   |  By Omkar Hiremath
When you’re running a business, it’s important for you to have a great reach to the people using your services. The internet is the easiest way to reach your customers. When the internet era began, people started using web applications as a way to reach a larger audience. And that worked like a charm! Then with the advent of smartphones, people started using mobile applications in addition to web applications.
Jun 24, 2020   |  By Daniel de Oliveira
Account takeovers (ATOs), also known as “account hijacking,” are a type of fraud that’s on the rise these days! This type of attack is attractive to hackers due to the financial return and the ease of such an attack: user account takeover is relatively low cost and has a high success rate. Additionally, there are many means to make money off an account that has been taken over, or in using it to perform more advanced attacks.
Jun 17, 2020   |  By Josh
Account takeover attacks (ATOs) are an important vector to consider as you evolve your security strategy. When bad actors take over your legitimate user accounts, they’re able to steal customer data, commit fraud, and gain a wider attack surface within your application. To help companies better understand and protect against ATOs, we’ve put together a new ATO whitepaper.
Jun 8, 2020   |  By Michiel Mulders
As the number of web applications grows and the digital world becomes more advanced, so also have hacking activities become more sophisticated. To keep up with all those hacking activities, many new security tools have been developed to help organizations detect vulnerabilities before hackers do. Often, those tools are fairly expensive. This discourages many organizations who are on a tighter budget from investing in security tools. Luckily, the open-source (OS) community can help us.
May 28, 2020   |  By Arnab Roy Chowdhury
Microservices have refashioned the way modern apps are developed. Previously, monolithic architecture was used for app development. A monolithic app is made from a single unit with three parts: a database, a client-side UI that runs on the user’s system or browser, and a server-side app. But in microservices, an app consists of multiple units. Each of these units runs alone and connects via APIs.
Jan 28, 2019   |  By Sqreen
You use AWS. It’s secure out of the box, but introducing security issues through misconfiguration is easy. This checklist will help guide you to potential security issues exposed by your AWS configuration, and will help you to tighten up the security of your AWS infrastructure.
Jan 1, 2019   |  By Sqreen
Improve the security of your Node.js app with the Node.js Security Handbook made for developers.
Dec 1, 2018   |  By Sqreen
Improve the security of your Ruby app with the Ruby Security Handbook made for developers.
Nov 13, 2018   |  By Sqreen
NearForm and Sqreen are delighted to come together to share their insights on DevOps and security integration.
Jul 6, 2018   |  By Sqreen
In this talk we will see how a malicious user can obtain a MongoDB injection and use it to prevent an application from responding.
Mar 19, 2018   |  By Sqreen
We have interviewed Arnaud Breton, the organizer of this meetup group and Head of Product of Sqreen.
Jan 10, 2018   |  By Sqreen
Formerly at Screenhero then Slack, Don was most recently Head of Developer Relations at Sqreen. Don was on the ground the day Slack’s security was breached, and shares some of the insights scaling startups need to handle the inevitable: getting hacked.
Sep 27, 2017   |  By Sqreen
This video was recorded during TechLunch #15 - Scaling Your Infrastructure on Sept 27th, 2017 at Algolia