Secrets and credentials

3 posts
Mobile app security: A best practices checklist for startups and scale-ups

Mobile app security: A best practices checklist for startups and scale-ups

Startups and scale-ups are vulnerable to cyberattacks as mobile apps grow. Implementing encryption, multi-factor authentication, and secure communication is crucial. Leadership should integrate security into the product lifecycle to protect both data and reputation.

Automating malware scanning on uploaded files

Automating malware scanning on uploaded files

Implementing a malware scan for file uploads using ClamAV on DigitalOcean, this post details setting up a pragmatic solution despite infrastructure limitations. It covers the initial approach, technical setup, challenges, and potential improvements for a secure file-handling system.

Navigating corporate measures with creativity

Navigating corporate measures with creativity

Discover ingenious ways to navigate frustrating security measures and bypass obstacles. Don't be bound by rigid policies; creativity triumphs over compliance.

You’ve successfully subscribed to madewithlove
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.