Building Slack’s Anomaly Event Response
As cyberattacks evolve to unprecedented levels of sophistication and speed, the time gap between breach…
As cyberattacks evolve to unprecedented levels of sophistication and speed, the time gap between breach…
At Slack, we’re committed to security that goes beyond the ordinary. We continuously strive to earn and…
Slack uses cookies to track session states for users on slack.com and the Slack Desktop app. The ever-present…
At Slack, we’ve long been conservative technologists. In other words, when we invest in leveraging a new…
We are heavy users of Amazon Compute Compute Cloud (EC2) at Slack — we run approximately 60,000 EC2 instances…
A form on a website may seem like a pretty trifling thing. A couple of text fields, a submit button, and you’re…
Batten down the hatches! The app sandbox is now enabled for all web content. This is a fancy way of saying we’ve…
“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service…