Sqreen Blog
  • Docs
Sqreen Blog

The Official Sqreen Blog

  • Docs

Eric

10 posts
  • Security
  • 7 minute read
  • No comments

What is a Content Security Policy (CSP) and why is it important?

  • Eric
  • April 9, 2021
Trust is the fundamental currency of the internet. You trust your service provider that they’ll continue to maintain your internet access. Your developers trust your architecture provider when they say…
View Post
  • Security
  • 7 minute read
  • No comments

CIS 20 overview and what not to miss

  • Eric
  • April 7, 2021
One of the more common mistakes that I see organizations make on digital security is ignoring free resources that can help their business level up. This is rarely intentional. Instead,…
View Post
  • Security
  • 6 minute read
  • No comments

The startup’s guide to securing your infrastructure

  • Eric
  • January 30, 2020
Running tech at a startup is a hard job. You’re on a shoestring budget, if you even have one. You’re constantly understaffed. Everyone needs that new feature or server set…
View Post
  • Security
  • 6 minute read
  • One comment

How to manage security debt as a startup

  • Eric
  • January 7, 2020
What do you know about security debt? As the leader of a software startup, you’re probably familiar with the concept of technical debt. Technical debt is where your team makes…
View Post
  • Dev
  • Security
  • 6 minute read
  • No comments

What is chaos engineering and why does it matter?

  • Eric
  • November 21, 2019
The big day is finally here. That project your team has been working on for the last six months? It’s launching today. A little giddy with anticipation, the team monitors…
View Post
  • Security
  • 6 minute read
  • No comments

The most common types of ATO attacks

  • Eric
  • October 15, 2019
As a security owner, you need to protect your users against a wide variety of attacks. Many engineers spend a great deal of time focusing on big-picture attacks. They want…
View Post
  • Java
  • Security
  • 6 minute read
  • One comment

5 security best practices for Java

  • Eric
  • September 5, 2019
When it came along in the mid-1990s, Java promised a revolution in programming languages. At the time, a great deal of business programming took place in C or C++. Anyone…
View Post
  • Security
  • 6 minute read
  • One comment

How to choose the right pentester for you

  • Eric
  • August 27, 2019
There are a variety of reasons your company might look to hire a penetration tester. For many companies, their first foray into penetration testing comes at the request of a…
View Post
  • Security
  • 7 minute read
  • One comment

Top 10 security traps to avoid when migrating from a monolith to microservices

  • Eric
  • August 20, 2019
Your team is thinking about migrating from a monolithic architecture to microservices. You’re intrigued. The promises of additional scalability and more predictable deployments sound nice. You’ve also been down this…
View Post
  • Security
  • 7 minute read
  • One comment

Your Company Was Just Breached. Now What?

  • Eric
  • July 2, 2019
So, your company has suffered a security breach, and your team didn’t have a data breach plan in place to handle it. That’s bad news, but take a deep breath.…
View Post
Search
Recent Posts
  • Democratizing security: The next step in Sqreen’s journey
  • Heroku Security: Securing your Heroku application
  • What is a Content Security Policy (CSP) and why is it important?
  • CIS 20 overview and what not to miss
  • Building secure applications: Top 10 application security best practices
Categories
  • Dev (56)
  • DevOps (14)
  • Go (5)
  • Java (4)
  • JavaScript (7)
  • Node.js (15)
  • PHP (3)
  • Python (18)
  • Ruby (16)
  • Security (136)
  • Sqreen Product (35)
By the Sqreen Team ❤
© Sqreen 2015-2021 – Privacy Policy