Skip to main content

4 posts tagged with "security"

View All Tags

· 2 min read

ConfigCat is proud to offer a robust, comprehensive feature flag service for software engineers to utilize safe trunk based development.

ISO-27001

Companies must use the most up-to-date standards when developing their unique Information Security Management System (ISMS), as information security becomes significantly more difficult to protect the more an organization grows.

· One min read
Gergely Sinka

ConfigCat is NOT affected

A remote code execution flaw was recently discovered in log4j. The vulnerability is fixed in log4j 2.15.0.

Log4j is a popular Java logging library. It is used by many popular Java applications. We have double-checked our systems and SDKs to be sure that they are not affected by this vulnerability.

· 5 min read
Csilla Kisfaludi

Nowadays, almost each and every business uses some sort of web application, so cyberattacks are becoming a daily struggle for huge enterprises as well as for small businesses. It’s not enough for programmers to build an application that looks great and works smoothly. Many consumers are getting aware of the need for security in the applications they are using.

As ConfigCat is a Software as a Service business with applications running in the cloud, we take security as seriously as reliability. Here are the security measures we take to ensure that we deliver a secure application.

ConfigCat's security framework title

· One min read
Gergely Sinka

What is 2FA?

2FA is a way of granting access to users only after presenting two separate pieces of evidence (factors). One of these factors is usually a password which the user should know and the other factor something they have or even something they are. This way you can be sure that only knowing your password won't be enough for an attacker to gain access to your account.

How does 2FA work in ConfigCat?

In our case the first factor is password you use to login to ConfigCat Dashboard. The second factor is a 6-digit number generated via an Authenticator App.