San Francisco, CA, USA
Sep 10, 2019   |  By Sylvain
Sqreen’s Application Security Management platform relies on microagents to leverage the runtime context of applications for security. Our drive when building these agents is to make our protection transparent and as frictionless as possible. The Sqreen agent applies dynamic instrumentation in order to report and protect the application without code modification. We have agents in many languages (and have shared what goes into building them in different languages).
Sep 5, 2019   |  By Eric
When it came along in the mid-1990s, Java promised a revolution in programming languages. At the time, a great deal of business programming took place in C or C++. Anyone who’s written those languages professionally knows that they can be full of non-obvious pitfalls. Java was a revelation because it removed many of those pitfalls. Instead of worrying about manually allocating and freeing memory, Java did all of that for you.
Sep 4, 2019   |  By Boris
One of the great things about security is that there is always more to learn. When you’re protecting your applications and users, understanding the kinds of attacks bad actors may attempt can help you get a better sense of how you should protect your applications and the kind of business logic threats you may be exposed to. In this article, we’re going to take a look at timing attacks.
Aug 27, 2019   |  By Eric
There are a variety of reasons your company might look to hire a penetration tester. For many companies, their first foray into penetration testing comes at the request of a potential business partner. In order to close a big deal, that partner requests that you hire a penetration tester to verify the security of your team’s software. As a part of the contract, you’ll categorize the vulnerabilities they uncover, and fix any major issues.
Aug 22, 2019   |  By Christian Melndez
There’s no doubt that Kubernetes adoption has increased a lot since its first release. But, as Ian Coldwater said in his talk about abusing the Kubernetes defaults: Kubernetes is insecure by design and the cloud only makes it worse. Not everyone has the same security needs, and some developers and engineers might want more granular control on specific configurations.
Jan 28, 2019   |  By Sqreen
You use AWS. It’s secure out of the box, but introducing security issues through misconfiguration is easy. This checklist will help guide you to potential security issues exposed by your AWS configuration, and will help you to tighten up the security of your AWS infrastructure.
Jan 1, 2019   |  By Sqreen
Improve the security of your Node.js app with the Node.js Security Handbook made for developers.
Dec 1, 2018   |  By Sqreen
Improve the security of your Ruby app with the Ruby Security Handbook made for developers.
Nov 13, 2018   |  By Sqreen
NearForm and Sqreen are delighted to come together to share their insights on DevOps and security integration.
Jul 6, 2018   |  By Sqreen
In this talk we will see how a malicious user can obtain a MongoDB injection and use it to prevent an application from responding.
Mar 19, 2018   |  By Sqreen
We have interviewed Arnaud Breton, the organizer of this meetup group and Head of Product of Sqreen.
Jan 10, 2018   |  By Sqreen
Formerly at Screenhero then Slack, Don was most recently Head of Developer Relations at Sqreen. Don was on the ground the day Slack’s security was breached, and shares some of the insights scaling startups need to handle the inevitable: getting hacked.
Sep 27, 2017   |  By Sqreen
This video was recorded during TechLunch #15 - Scaling Your Infrastructure on Sept 27th, 2017 at Algolia