What is a Content Security Policy (CSP) and why is it important?
Trust is the fundamental currency of the internet. You trust your service provider that they’ll continue to maintain your internet access. Your developers trust your architecture provider when they say…
CIS 20 overview and what not to miss
One of the more common mistakes that I see organizations make on digital security is ignoring free resources that can help their business level up. This is rarely intentional. Instead,…
Building secure applications: Top 10 application security best practices
Last updated in April, 2021 Recently, here on the blog, I’ve been talking about security and secure applications quite a bit. It’s both a fascinating topic as well as an…
Top 7 security best practices for APIs
As cybersecurity attacks become more and more common, it’s extremely important to secure your APIs. However, some developers neglect securing their APIs if they believe their APIs are only communicating…
Stored XSS, explained: How to prevent stored XSS in your app
Web applications are one of the most targeted assets these days because they’re both open to the internet and have a larger attack surface. Attackers find various ways to hack…
Preventing SQL injection in Node.js (and other vulnerabilities)
The database is an essential part of a web application. It’s where you receive and store users’ data, which you can then use to provide personalized services. As such, database…
Server-side request forgery (SSRF), explained
Web applications have become one of the most important assets for companies of all sizes. And due to this, they have also become a target. Web applications are getting more…
Preventing SQL injections in PHP (and other vulnerabilities)
If you’ve been around web development for a while, you’ve almost certainly heard the term “SQL injection” and some terrifying stories about it. PHP, like many other languages, is not…
Running a coding dojo at Sqreen
At Sqreen, we take training seriously. We’ve always given Sqreeners access to conferences and run community learning events in our Paris office, but, of course, the current health crisis has…
Preventing SQL injections in Ruby (and other vulnerabilities)
This post’s topic is very straightforward: SQL injection, Ruby flavored. More specifically, how you can protect your Ruby application against SQL injections—and other common security threats. Ruby is a wonderful…