-
June 16, 2020
How Rust lets us monitor 30k API calls/min
At Bearer, we are a polyglot engineering team. Both in spoken languages and programming languages. Our stack is made up...
-
August 4, 2023
Software Security 2.0 – Securing AI Generated Code
-
July 13, 2023
We benchmarks the best SAST tools, and this is what we learned
When we started to build Bearer, we wanted to understand how to validate the quality of our findings and be able...
-
June 12, 2023
Introducing GitLab security scanner integration
-
May 10, 2023
Top 10 ways to secure Ruby on Rails applications
-
March 21, 2023
Can we prevent a security incident like Loom’s?
-
August 24, 2022
AWS RDS data security best practices
-
August 12, 2022
The ultimate guide to securing data for Rails developers
-
August 11, 2022
Data Security Controls: Six Types and How to Implement Them
-
August 2, 2022
Data Breach Mitigation: 6 Steps You Can Take
-
July 28, 2022
Data Flow Mapping: Why It Matters and How to Do It
Working with data is something that requires a lot of care and precision, yet it often remains an under-scrutinized aspect...