DEV Community

Cossack Labs profile picture

Cossack Labs

Data security & cryptography. Focus on business growth—while we take care of sensitive data risks, security engineering challenges & compliance requirements

Location London Joined Joined on  Personal website https://www.cossacklabs.com/ twitter website
AWS security audit guide

AWS security audit guide

2
Comments 1
3 min read

Want to connect with Cossack Labs?

Create an account to connect with Cossack Labs. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Building security for digital wallets and financial applications

Building security for digital wallets and financial applications

2
Comments 1
2 min read
7 Steps to Building Anti-Fraud System for Digital Wallets

7 Steps to Building Anti-Fraud System for Digital Wallets

1
Comments
2 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

6
Comments
2 min read
Smart contracts: audit ‘em all like a security engineer

Smart contracts: audit ‘em all like a security engineer

5
Comments
2 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

8
Comments
2 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
🚨 Robotic devices can be hijacked through cryptographic failures in encryption

🚨 Robotic devices can be hijacked through cryptographic failures in encryption

10
Comments
1 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

8
Comments 1
2 min read
Encryption in ⛅ cloud native apps

Encryption in ⛅ cloud native apps

12
Comments
3 min read
10 tips for volunteering devs from data security engineers

10 tips for volunteering devs from data security engineers

10
Comments 1
3 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

13
Comments
3 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Exploring 🚩🚩🚩red flags in React Native security libraries

Exploring 🚩🚩🚩red flags in React Native security libraries

5
Comments
2 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
OCSP and CRL: what could go wrong?

OCSP and CRL: what could go wrong?

13
Comments
3 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

9
Comments 4
1 min read
Acra. Features: Data masking

Acra. Features: Data masking

8
Comments
1 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

8
Comments
2 min read
What is application-level encryption and why it’s not TLS 02:01

What is application-level encryption and why it’s not TLS

13
Comments
3 min read
How cryptography 💪works to protect ML models 02:05

How cryptography 💪works to protect ML models

13
Comments
2 min read
Encoding vs encryption for 📱iOS app devs 00:45

Encoding vs encryption for 📱iOS app devs

22
Comments 1
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

12
Comments
5 min read
What do appsec and fire extinguishers have in common?

What do appsec and fire extinguishers have in common?

8
Comments
3 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

9
Comments
1 min read
Complicated encryption ways explained in 2 min, by @vixentael 02:31

Complicated encryption ways explained in 2 min, by @vixentael

12
Comments
1 min read
Cloud security: gaps in a "shared responsibility" model

Cloud security: gaps in a "shared responsibility" model

7
Comments
2 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

4
Comments
1 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

7
Comments
1 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

6
Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

7
Comments
2 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

8
Comments
1 min read
🚀 Writing secure React Native app

🚀 Writing secure React Native app

12
Comments
2 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
💻 Software Versioning: What Numbers Say

💻 Software Versioning: What Numbers Say

21
Comments 3
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
Automated Software Security Testing for Devs

Automated Software Security Testing for Devs

26
Comments
1 min read
loading...