Skip to main content

8 posts tagged with "security"

View All Tags

Feature Flagging for Security - Best Practices and Use Cases

· 9 min read
David Herbert
Changing the world, one line of code at a time

The rapid pace of software development and the need to continuously deliver new features to stay competitive in today's market has introduced a unique set of challenges, one of which is security. With more and more software applications coming to play a pivotal role in user's daily lives, ensuring the security of these applications is paramount.

Security has become increasingly important for businesses and organizations of all sizes, especially in today's ever-evolving landscape, where cyber threats constantly loom around the corners like shadowy specters. As software systems become increasingly complex and cyberattacks become more prevalent, organizations need effective strategies and tools to bolster their security posture.

The question arising then is: How can they strike a harmonious balance between ensuring the security of their applications and meeting the relentless demand for innovation? One such tool that has gained prominence is feature flagging, and in this blog post, we'll examine how we can utilize it to enhance security while following best practices.

Feature Flagging for Security Cover Image

Leveraging Feature Flags in Government Agencies

· 6 min read
Zayyad Muhammad Sani
You live, you learn.

Government agencies, with their strict security requirements, often face difficulties in fully embracing DevSecOps practices. Balancing the need for rapid feature releases with robust security measures poses a challenge. Feature flags offer a promising solution in this context. By seamlessly integrating into DevOps and DevSecOps pipelines, they can empower government agencies to effectively manage feature releases while maintaining high levels of security.

On and off feature flags crossed

Feature Management Architecture & Security (what to consider)

· 5 min read
Ezinne Kalu
To each their own.

Adding new features to existing applications used to mean that code pushed into production automatically updated the entire app. This raises security risks to the existing application, because a single bug could have catastrophic consequences. This risk can be reduced by implementing a secure feature management architecture that allows code updates with increased flexibility and the power to easily switch between versions.

code banner

Choosing a SaaS Provider - Questions and Considerations

· 4 min read
David Herbert
Changing the world, one line of code at a time

Choosing the right SaaS (Software as a Service) provider is a crucial decision for any organization. When evaluating potential vendors, it's essential to have a clear understanding of their security measures, service level agreements, and other factors that may impact your business.

Here are some key questions to help guide your evaluation process. Questions for SaaS provider

ConfigCat just got ISO 27001 certified

· 2 min read

ConfigCat is proud to offer a robust, comprehensive feature flag service for software engineers to utilize safe trunk based development.

ISO-27001

Companies must use the most up-to-date standards when developing their unique Information Security Management System (ISMS), as information security becomes significantly more difficult to protect the more an organization grows.

ConfigCat’s Security Framework

· 5 min read
Csilla Kisfaludi
Tech support by day, movie addict by night, crazy cat lady 24/7.

Nowadays, almost each and every business uses some sort of web application, so cyberattacks are becoming a daily struggle for huge enterprises as well as for small businesses. It’s not enough for programmers to build an application that looks great and works smoothly. Many consumers are getting aware of the need for security in the applications they are using.

As ConfigCat is a Software as a Service business with applications running in the cloud, we take security as seriously as reliability. Here are the security measures we take to ensure that we deliver a secure application.

ConfigCat's security framework title

Two-Factor Authentication (2FA) in ConfigCat

· One min read
Gergely Sinka
"Not all code paths return a value." - VS

What is 2FA?

2FA is a way of granting access to users only after presenting two separate pieces of evidence (factors). One of these factors is usually a password which the user should know and the other factor something they have or even something they are. This way you can be sure that only knowing your password won't be enough for an attacker to gain access to your account.

How does 2FA work in ConfigCat?

In our case the first factor is password you use to login to ConfigCat Dashboard. The second factor is a 6-digit number generated via an Authenticator App.