Bearer

Paris, France
2018
  |  By Guillaume Montard
In our previous blog post, we introduced Bearer’s new GitHub App and highlighted its seamless onboarding process and on-demand scanning capabilities. Today, we focus on how this app can significantly enhance the developer experience within Pull Requests (PRs) while providing critical reporting capabilities to security teams.
  |  By Guillaume Montard
We are thrilled to introduce the Bearer GitHub App, a powerful addition designed to streamline your workflow and elevate your security practices.
  |  By Guillaume Montard
PHP holds the bar as one of the most popular and sought-after technologies for web development. As W3Techs shows, PHP code is running on 76.8% of all websites around the globe. We are very excited to announce that the latest version of Bearer now supports PHP in Beta, with more than 50 rules already available, providing a good level of security risks and vulnerabilities coverage. For the PHP support in this release, we have included a strong focus on the popular Symfony framework.
  |  By Guillaume Montard
2023 Summer is definitely over, but the good news is that it kept our team very busy. We have lots of new features and improvements to share with you today.
  |  By Guillaume Montard
A little over 5 months ago, we launched our free and open code security product Bearer CLI to help teams identify both security and privacy risks in the earliest stages of the software development process. Please join us in celebrations, as today we are very excited to have achieved a key milestone in our journey - 100,000 code security scans!
  |  By Guillaume Montard
What does a good DevSecOps pipeline should look like from a code security perspective? We hear this question often, and even though there are multiple answers, we’ve put together a blueprint that everybody could easily start with.
  |  By Guest Contributor
Often security engineers find it difficult to scale secure code review processes either due to lack of funding, adoption to smaller sprint cycles or even security engineers failing to integrate security to agile philosophy. This post talks about various ways to address such challenges.
  |  By Andrew Becherer
The integration of machine learning into software development is revolutionizing the field, automating tasks and generating complex code snippets at an unprecedented scale. However, this powerful paradigm shift also presents significant challenges including the risk of introducing security flaws into the codebase. This issue is explored in depth in the paper Do Users Write More Insecure Code with AI Assistants? by Neil Perry, Megha Srivastava, Deepak Kumar, and Dan Boneh.
  |  By Guillaume Montard
Did you know that Bearer offers the ability to automatically compile the privacy information Legal teams need from Security and Engineering teams?
  |  By Guillaume Montard
When we started to build Bearer, we wanted to understand how to validate the quality of our findings and be able to benchmark it. Code security scanning solutions are notorious for reporting a lot of false positives and other deficiencies, and even though we believed we could do much better, we needed a way to prove it. In Java, there is an OWASP project, BenchmarkJava, which makes it easy to compare the output of two software security solutions.
  |  By Bearer
This tutorial demonstrates how to create an OAuth application for use with the imgur API. This tutorial covers both (i) creating your application; as well as (ii) retrieving your OAuth 2.0 client ID and client secret.
  |  By Bearer
This tutorial demonstrates how to create an OAuth application for use with the HubSpot API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes and redirect URI.
  |  By Bearer
This tutorial demonstrates how to create an OAuth application to use with the Eventbrite API. This tutorial covers (i) creating your application; (ii) configuring the redirect URI with Bearer.sh; as well as (iii) retrieving your OAuth 2.0 client ID and client secret.
  |  By Bearer
This tutorial demonstrates how to create an OAuth application for use with the Pinterest API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes and redirect URI.
  |  By Bearer
This tutorial demonstrates how to create a project in Google Cloud Console for use with the Google Calendar API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes.
  |  By Bearer
This tutorial demonstrates how to retrieve credentials on Zoom developer website for use with the Zoom API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes.
  |  By Bearer
This tutorial demonstrates how to retrieve credentials on Typeform developer website for use with the Typeform API. This tutorial covers creating your application as well as retrieving your OAuth 2.0 client ID and client secret.
  |  By Bearer
This tutorial demonstrates how to create a project in the Google API console and enable the Gmail API. This tutorial covers both creating your application as well as retrieving your OAuth 2.0 client ID and client secret.
  |  By Bearer
This tutorial demonstrates how to retrieve credentials on Slack developer website for use with the Slack API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes.
  |  By Bearer
This tutorial demonstrates how to create a project in the Google API console and enable the Google Sheets API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes.

Bearer helps companies automate GDPR compliance by implementing Privacy by Design into their product development processes.

We bridge the gap between Engineering & Privacy so that organizations can build privacy-first products, comply with privacy laws, and leverage it as a competitive advantage to drive their business.