Introduction The current situation with SBOMs Types of SBOMs Spotting weak dependencies SBOM and CRA Generating SBOMs: Different tools for different situations Manual SBOM generation GitHub SBOM Generator SBOM for Docker SBOM Benchmarks Inconsistencies in SBOM generation tools SBOMs in security context SBOMs are not accurate SBOMs can include vulnerabilities SBOMs can be signed SBOMs can include hash sums SBOMs’ hindered commercial adoption Data format compatibility issues Privacy concerns ...| Blog on Cossack Labs
Security challenges for Machine Learning models System architecture for delivering and executing ML models on edge device Risks and threats of running ML models in mobile apps Security defences for ML models ML model encryption Cloud and API protection Mobile application anti-tampering controls Proactive anti-fraud security measures Conclusion ML models are unique combinations of data and algorithms that have been trained on massive volumes of data to provide answers, classify incoming data, ...| Blog on Cossack Labs
Acra provides application level encryption, masking, tokenisation, access control, database leakage prevention, and intrusion detection for modern data-processing apps.| Cossack Labs
Data security for financial services: transaction encryption, secure data vault, verifiable audit logging, cloud native security, zero trust networking.| Cossack Labs
Integrating encryption and data masking for sensitive data stored in MySQL cluster. A combination of transparent SQL encryption via AcraServer and encryption API via AcraTranslator makes Acra fit for complex solutions.| Cossack Labs
This Privacy Policy explains how your personal information is collected, used, and disclosed by Cossack Labs Limited website(s)| Cossack Labs
This Cookie Policy describes how your personal information is collected, used, and shared when you visit https://www.cossacklabs.com/ and all its subdomains.| Cossack Labs
Themis provides easy-to-use and hard-to-misuse encryption API for securing data at rest and in transit, and is available across multiple platforms.| Cossack Labs
Security advisory services: assisting companies to build security strategy, tactical security roadmap that correlates with business risk and growth.| Cossack Labs
Mobile apps security: end-to-end encryption, stored data protection, API protection, code obfuscation, mobile security audit, mobile security review.| Cossack Labs
Protecting data signals transmitted over the air between power distribution stations and central dispatch system.| Cossack Labs
The chances are high that you’ve met our work-without seeing it. Our data security solutions relieve companies from security engineering pains.| Cossack Labs
Long-term cooperation with the [REDACTED] company resulted in refined security practices that matched the evolution of their B2B platform. We enabled transition from reactive "firefighting" to a proactive security posture, while simplifying security processes and building security defences.| Cossack Labs
When a bank launches an entirely new banking application, it necessitates a thorough mobile security assessment, diligent efforts to ensure financial transaction security and tailored fraud prevention measures.| Cossack Labs
Security engineering & architecture: design security architecture, security architecture review, security audit, implementation of security controls.| Cossack Labs
Data security tools, solutions and custom engineering. We help companies to protect data, prevent data leakage and comply with regulations| Cossack Labs
Cossack Labs Mobile Security Score (CL MSS) is an application security framework for mobile applications. It focuses on risk-based requirements, continuous risk management, and measurable progress for enhancing mobile app security and sensitive data protection.| Cossack Labs