25 posts

Security

Articles and guides about Security.

SecurityDevOpsStartups

Web Application Security Checklist for Startups

A prioritized security checklist for web applications, the vulnerabilities that actually get exploited and how to prevent them without slowing down development.

Veld Systems
Web Application Security Checklist for Startups
MobileSecurityStartups

Mobile App Security: A Practical Guide for Startups

A practical mobile app security guide covering secure storage, API protection, certificate pinning, and the OWASP Mobile Top 10, prioritized for startup teams.

Veld Systems
Mobile App Security: A Practical Guide for Startups
MarketplaceSecurityArchitecture

Marketplace Trust and Safety: Protecting Buyers and Sellers

How to build trust and safety systems for your marketplace app. Covers identity verification, fraud prevention, dispute resolution, and content moderation.

Veld Systems
Marketplace Trust and Safety: Protecting Buyers and Sellers
SecurityEngineeringGuide

OAuth and Social Login Implementation: The Complete Guide

Implement OAuth and social login correctly. Learn the security pitfalls, provider differences, and architecture decisions that make authentication reliable at scale.

Veld Systems
OAuth and Social Login Implementation: The Complete Guide
SecurityDevOpsEngineering

Secrets Management: Keeping API Keys and Credentials Safe

A practical guide to secrets management for engineering teams. Covers common mistakes like hardcoded credentials, environment variables vs secret managers, rotation strategies, and CI/CD pipeline secrets.

Veld Systems
Secrets Management: Keeping API Keys and Credentials Safe
SecurityEngineeringArchitecture

How to Handle Data Deletion Requests Without Breaking Your App

A practical guide to implementing user data deletion that satisfies GDPR and CCPA requirements without corrupting your database or breaking dependent systems.

Veld Systems
How to Handle Data Deletion Requests Without Breaking Your App
SecurityEngineeringGuide

Adding Two Factor Authentication to Your Product

A practical guide to implementing two factor authentication in your web or mobile app. Covers TOTP, SMS, passkeys, and the UX tradeoffs that actually matter.

Veld Systems
Adding Two Factor Authentication to Your Product
SecurityAPIEngineering

API Security Beyond Authentication: Rate Limiting, Validation, and Encryption

A deep dive into API security beyond authentication. Covers rate limiting, input validation, encryption, OWASP API risks, and production hardening techniques.

Veld Systems
API Security Beyond Authentication: Rate Limiting, Validation, and Encryption
SecurityPaymentsGuide

PCI Compliance for Apps That Process Payments

A practical guide to PCI DSS compliance for applications that process payments. Covers SAQ levels, tokenization, secure architecture, and cost breakdowns.

Veld Systems
PCI Compliance for Apps That Process Payments
SecurityGuideArchitecture

HIPAA Compliance for Health Tech Apps: Technical Requirements

Technical requirements for building HIPAA compliant health tech applications. Covers PHI handling, encryption, access controls, audit logging, and BAAs.

Veld Systems
HIPAA Compliance for Health Tech Apps: Technical Requirements
SecuritySaaSGuide

GDPR Compliance for SaaS: What You Actually Need to Do

A technical guide to GDPR compliance for SaaS companies. Covers data mapping, consent, deletion, DPAs, and the engineering work required to stay compliant.

Veld Systems
GDPR Compliance for SaaS: What You Actually Need to Do
SecurityStartupsGuide

SOC 2 Compliance for Startups: What It Costs and What It Takes

A practical breakdown of SOC 2 compliance costs, timelines, and technical requirements for startups. Real numbers and engineering decisions that matter.

Veld Systems
SOC 2 Compliance for Startups: What It Costs and What It Takes
SecurityTestingEngineering

Penetration Testing Your Own Application

A practical guide to penetration testing your application. What to test, how to scope it, which tools to use, and how to act on the results without breaking production.

Veld Systems
Penetration Testing Your Own Application
ArchitectureSecuritySaaS

Designing a Permissions System: RBAC vs ABAC for Your Product

RBAC and ABAC solve different problems. Learn which permissions architecture fits your product, when to combine them, and how to avoid rebuilding access control later.

Veld Systems
Designing a Permissions System: RBAC vs ABAC for Your Product
SecurityArchitectureFull Stack

Authentication Architecture: JWT vs Sessions vs OAuth

Choosing the wrong authentication architecture creates security debt that compounds. A practical guide to JWT, sessions, and OAuth for production applications.

Veld Systems
Authentication Architecture: JWT vs Sessions vs OAuth
SecurityGuideSaaS

CCPA Compliance for Software Products

A practical guide to CCPA compliance for software teams. What the law requires, how it affects your product, and the technical changes you need to make.

Veld Systems
CCPA Compliance for Software Products
SecurityArchitectureSaaS

SSO Implementation for Enterprise Customers

Learn how to implement SSO for enterprise customers, from SAML to OIDC. Practical architecture decisions, identity provider integration, and pitfalls we have seen on real projects.

Veld Systems
SSO Implementation for Enterprise Customers
SaaSSecurityArchitecture

Designing User Roles and Permissions for SaaS Products

A practical guide to designing role based access control (RBAC) for SaaS applications, from simple role hierarchies to fine grained permissions.

Veld Systems
Designing User Roles and Permissions for SaaS Products
SecurityArchitectureEngineering

Building Software for Regulated Industries

How to build software for regulated industries like healthcare, finance, and insurance. Covers compliance, security, audit trails, and the architecture decisions that matter.

Veld Systems
Building Software for Regulated Industries
AISecurityBusiness

AI Compliance and Data Privacy: What Your Business Needs to Know

AI compliance and data privacy requirements explained for business leaders. Learn what regulations apply, how to stay compliant, and what it costs to get it right.

Veld Systems
AI Compliance and Data Privacy: What Your Business Needs to Know
ArchitectureSecurityGuide

How to Build a Telehealth Platform: HIPAA, Architecture, and Cost

A technical guide to building a telehealth platform that is HIPAA compliant, scalable, and ready for production. Architecture, cost, and real decisions covered.

Veld Systems
How to Build a Telehealth Platform: HIPAA, Architecture, and Cost
EngineeringSecurityArchitecture

Audit Logging: Building a Complete Activity Trail

How to build production grade audit logging that tracks every user and system action. Covers schema design, write performance, querying, retention, and compliance.

Veld Systems
Audit Logging: Building a Complete Activity Trail
ArchitectureSecurityPayments

Building Fintech Software: Compliance, Architecture, and Cost

Building fintech software means navigating compliance, security, and complex architecture. Learn what it costs, what regulators expect, and how to ship without getting shut down.

Veld Systems
Building Fintech Software: Compliance, Architecture, and Cost
SecurityOperationsGuide

We Got Hacked: What to Do in the First 48 Hours

Your business was hacked. Here is the step by step playbook for the first 48 hours: containment, investigation, communication, and recovery.

Veld Systems
We Got Hacked: What to Do in the First 48 Hours
StrategySecurityEngineering

How to Build Software for Government Contracts

Learn how to build software that meets government contract requirements, from FedRAMP and Section 508 compliance to procurement timelines and security standards.

Veld Systems
How to Build Software for Government Contracts