Helping innovators. Protecting innovations.
Cossack Labs helps companies to efficiently and conveniently protect sensitive data in their products by providing developer tools, bespoke solutions and security consulting services.
Do not shackle your innovation with security challenges ever again.
Helping Ukraine. Protecting Ukrainians.
Cossack Labs stands with Ukraine and applies security engineering skills to protect the country. We assist Ukrainian companies in quickly understanding and correcting their security posture, especially if the company posture affects state or citizen security.
Solving security challenges
at scale that is right for you
#
From dev tools to bespoke solutions, from security control design to product security team for hire, we offer a wide gamut of ways to help you tackle security risks.
Helping across industries #
Typically we work with fintech, power grids, payment processors, healthcare companies, popular applications, AI/ML solutions. Whatever is the industry, we help those where data security is a hard requirement.
FSA / Fintech
Healthcare
Industrial / CNI
Blockchain
SaaS
Consumer apps
About Cossack Labs
At Cossack Labs, we build security solutions to protect sensitive data in customers'
products and infrastructures. We help ambitious companies innovate securely: innovate
while preserving user privacy, innovate in peace of mind that their innovation is protected.
Contact us
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Latest blogposts
Security autotests for measurable and stable application security processes
Security automation contributes to measurable improvements: stable security processes and efficient assessments that save time and effort. Security-focused pre-built templates covering p...
Practical OAuth security guide for mobile applications
How to implement OAuth in the context of mobile applications while avoiding security pitfalls? Practical steps on fortifying OAuth flow with PKCE, state parameter, managing secure redire...
Security tips on using YubiKey and FIDO U2F
Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target ...