Products
Solutions
Resources
Partners
Docs
Try Jscrambler for Free
Blog
JavaScript
Code Protection
Security
React
React Native
Angular
Vue
Back to Blog
Web Security
Tag
JavaScript Obfuscation: The Definitive Guide (2021)
By Jscrambler | 18 min read
JavaScript obfuscation is a series of code transformations that make JS extremely hard to understand and reverse-engineer. This guide explores it in-depth.
Q&A With Jasvir Nagra, Jscrambler Technical Advisor
By Jscrambler | 5 min read
Jasvir Nagra, Jscrambler Technical Advisor, explores the present and future of web security and the biggest challenges that organizations are facing.
How To Streamline Hardened Code Signing in DevSecOps Pipelines
By Shanice Jones | 4 min read
Digital certificate management can quickly become overwhelming. By using centralized code signing and HSMs, DevSecOps teams can streamline this workflow.
The 6 Aspects You Must Secure On Your MongoDB Instances
By Rui Trigo | 7 min read
Authentication, authorization, and accounting are key aspects of MongoDB instances. Here, we explore some quick wins to improve their security.
12 Checklist Items for Defeating Magecart Attacks
By Pedro Fortuna | 4 min read
These 12 verifications will help you procure a product that effectively tackles Magecart attacks and keeps the user experience intact on your website.
The Return Of Sports Brings With It The Return Of Streaming Pirates
By Carlos Rocha Gonçalves | 3 min read
Live sports are making their way back. To fend off pirates, which cost $9 billion in damages per year, providers must protect their watermarking solutions.
Hashing Algorithms
By Jscrambler | 8 min read
Hashing algorithms are cryptographic hash functions that map data to a hash of fixed size. They are designed to be a one-way, infeasible to invert function.
Jscrambler Named in Deloitte’s Technology Fast 500
By Jscrambler | 1 min read
Jscrambler has been named in Deloitte’s Technology Fast 500 ranking of the fastest-growing technology companies in the EMEA region.
How To Protect Your Organization From Magecart
By Pedro Fortuna | 5 min read
2020 has been ripe with high-profile Magecart attacks that have breached major organizations. Learn about the best magecart prevention tactics.
View More
Products
Code Integrity
Webpage Integrity
Solutions for
Finance
eCommerce
Broadcasting
Gaming & Gambling
IT & Software
Healthcare
Resources
Partners
Docs
Blog
Try Jscrambler for Free