DEV Community

loading...
Cossack Labs profile picture

Cossack Labs

Data security & cryptography. Focus on business growth—while we take care of sensitive data risks, security engineering challenges & compliance requirements

Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

Reactions 4 Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

Reactions 5 Comments
1 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

Reactions 7 Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

Reactions 5 Comments
2 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

Reactions 10 Comments
1 min read
🚀 Writing secure React Native app

🚀 Writing secure React Native app

Reactions 13 Comments
2 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

Reactions 8 Comments
3 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

Reactions 13 Comments
7 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

Reactions 5 Comments
2 min read
How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

Reactions 9 Comments
11 min read
💻 Software Versioning: What Numbers Say

💻 Software Versioning: What Numbers Say

Reactions 23 Comments 3
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

Reactions 9 Comments
4 min read
Should crypto be boring?

Should crypto be boring?

Reactions 7 Comments
1 min read
Automated Software Security Testing for Devs—Part 4

Automated Software Security Testing for Devs—Part 4

Reactions 10 Comments
5 min read
Automated Software Security Testing for Devs—Part 3

Automated Software Security Testing for Devs—Part 3

Reactions 9 Comments
6 min read
Automated Software Security Testing for Devs—Part 2

Automated Software Security Testing for Devs—Part 2

Reactions 10 Comments
5 min read
Automated Software Security Testing for Devs—Part 1

Automated Software Security Testing for Devs—Part 1

Reactions 18 Comments
4 min read
loading...