Jb

8 security best practices for SaaS startup CTOs

As the technology decision makers for SaaS...


Reflected XSS explained: how to prevent reflected XSS in your app

What is a reflected XSS? An XSS allows an attacker...


ICO Security

In ICO, the S stands for Security

ICOs are all the rage these days. You have ICOs...


SQL injection icon

Block SQL injections, not your customers

SQL Injections? How are those still a thing? A SQL...


Cloudbleed Logo

Anatomy of Cloudflare’s CloudBleed: what you need to know and fix

TL;DR This post gathers what you need to know, and...


Embedding JavaScript into Python

  TL; DR: v8.py PyMiniRacer brings a compiled...


Content Security Policy CSP

Integrating Content Security Policy into your Rails applications

TL; DR Content Security Policy (CSP) is an HTTP...


Tune your App Performance (and get fit for summer)

Premature optimization is the root of all...