How JScrambler Turns Your Browser Into The New Security Perimeter
If you ask most security leaders where their defenses begin, they will probably point to the traditional strongholds: hardened servers, locked down databases, well segmented networks. That is where the budgets have gone and where most vendors still crowd the stage, promising to keep your “data at rest” safe and sound.
JScrambler looks at that picture and politely suggests you are staring in the wrong direction.
“The moment where all inputs and all outputs come out of the company” is not the data center, says Rui Ribeiro, CEO of JScrambler. It is the browser. The customer’s browser. The laptop, phone, or tablet where third party scripts, ad tags, analytics pixels, payment widgets, and personalization engines all meet your business logic and your customer data.
That is what JScrambler calls the “new edge,” and it is where they have staked their claim in the security market.
“Most security companies are focused on data at rest, so protecting the perimeter, protecting the servers and data at rest,” Ribeiro explains. “When we started, we always focused on what we call the new edge, which is when users are interacting with the web application. So we would say, at the browser.”
For CISOs and security leaders who are tired of discovering data exposure through embarrassing headlines or regulator inquiries, the JScrambler model is simple: if attackers, pixels, or “helpful” martech (marketing technology) vendors are going to touch your customers’ data, that will almost always happen inside the browser. That is precisely where you need integrity, visibility, and control.
The Mess We Built In The Browser
Over the last decade, front end web development has quietly turned into a supply chain problem. What used to be a handful of first party scripts is now a crowded bazaar of code you do not own, do not fully control, and often barely understand.
“On average, a web page has like 66 different third parties there for ads, for payments, for shipping, for video,” Ribeiro notes. “All of the things are like mix match from multiple companies and embedded into these web pages.”
For security professionals, that should sound like a nightmare disguised as a conversion funnel. You have:
- Scripts that update constantly and silently
- Dependencies that pull in other dependencies
- Behavior that changes based on device, location, and user history
- Vendors whose real incentive is data harvesting and retargeting
OWASP has already flagged this as a top concern, putting client side supply chain risk near the top of its priority list. JScrambler has been living in that space for years, long before “Magecart” became shorthand for “someone scraped card data out of your checkout.”
Ribeiro describes the reality succinctly. Every user session may be effectively unique.
“Every user that’s interacting with a web page, imagine that both of us are booking a flight. I am on my phone. You are on your laptop. I’m in Portugal. You are here. We would get different sets of JavaScript because of localization, because of the device, because of the ad network that’s there, because of my past browsing history. We will get different sets of JavaScript. So it’s like each user is almost a new [application].”
For teams that still treat “the site” as a single static asset to be tested periodically, that is a harsh wake up call. In effect, you do not have one web app. You have countless variants in the wild, stitched together at runtime by third parties whose incentives rarely align with your risk tolerance.
From Observability To Enforcement In The Browser
JScrambler originally entered this market with a focus on integrity. They helped organizations see what was running on their pages and whether it had been tampered with. That alone is valuable, but as anyone who has stared at a dashboard full of red flags knows, visibility without control quickly becomes yet another source of anxiety.
Ribeiro is blunt about the shift.
“Initially, observability was the demand. Most of the customers down the road understand that they can have a pre emptive strategy.”
Today, JScrambler goes beyond detection into what Ribeiro calls “full sandboxing of every third party JavaScript that is on the web page.” In practical terms, that means the company can:
- Isolate each script in its own sandbox
- Control what DOM elements, forms, and data each script can see
- Flag and block behavior that is not consistent with the script’s intended purpose
He gives a simple, painfully relevant example.
“We make sure that none of them is overstepping in terms of behavior. So for example, accessing a form with payment data, if you are a video player, why are you accessing a form or payment data?”
This is where JScrambler starts to look less like a passive monitor and more like a policy enforcement point inside the browser. Security teams can define what a given vendor or script is supposed to do, and JScrambler makes sure it does not help itself to more.
“Beyond just detection,” Ribeiro emphasizes, “we provide actual enforcing of these policies.”
The AI And Hyper Personalization Tax
If you think this problem will get better on its own, you have not been paying attention.
Hyper personalization, real time recommendation engines, and AI powered optimization all demand one thing: more data. Behavioral data. Transaction data. Identity data. The kind of data your marketing team loves and your regulator might want a word about.
“With AI enabled companies, data harvesting is becoming essential part of all that the third party scripts are doing on your web page,” Ribeiro says. “Because that is how you get the really good experience, if they have full context.”
The trouble is that these same data streams are quietly bleeding away the very value your company is built on.
“At the same time, that is how you get the big problem for your company, because then you’re leaking data, not only from a privacy perspective, but also from your own company value,” Ribeiro warns. “If you are pushing that data of my users, the profile of my users, what they like to buy, when they buy, how many units, all of that information is being brought to third parties. You are destroying your value.”
In other words, your marketing stack may be teaching your competitors more about your customers than your in house analytics. That is not “data driven.” That is subsidizing your competition.
It is not just e commerce, either. JScrambler is seeing client side data exposure across:
- Healthcare portals
- Travel and hospitality
- Financial services and banking
- Traditional retail with online ordering or loyalty programs
Anywhere a browser session mixes sensitive data with third party scripts, you have the ingredients for data leakage at scale.

TikTok, Meta, And The “Default” Overreach Problem
To coincide with RSA, JScrambler ran research across a broad sample of e commerce sites, focusing on how major third party pixels behave in the real world. One of the more eye opening findings took aim at the industry’s current favorite pixels: TikTok and Meta.
“We have identified that both TikTok and Meta do overreach in terms of that grabbing strategy,” Ribeiro says. “I’m not saying that they’re doing anything wrong. I’m just saying that it was not expected from most people in the industry.”
The TikTok pixel, for example, would scan every form on a page, looking for email addresses and phone numbers, hash them, and send them back.
To the uninitiated, that might sound benign. To anyone who has ever built a lookup table, it is a red flag.
“Most people out of our industry think, oh, that information is not the email, neither the phone,” he notes. “But we all know that every hash, while not reversible, you can build tables and then find the match.”
JScrambler is careful not to ascribe malicious intent, but the practical effect is the same. Data that users never thought they were giving to TikTok or Meta is quietly flowing to those platforms whenever they interact with a page that happens to include those pixels.
And it is not just big tech. Ribeiro points to accidents that are almost worse than deliberate tracking.
“We even found situations where brick and mortar stores like retail, normal retail, where you buy food and stuff like that, they were sending your address to Facebook by mistake,” he says. “I’m not saying that Facebook has any intention to use that, far from me too. But again, the information is already there. And that is the problem. The company did share.”
If your defense strategy is “we asked for consent in a cookie banner,” this is where you should start to feel uncomfortable.
Consent Is Not Control
Regulators have tried to solve this problem with privacy frameworks and consent mechanisms. Europe has GDPR. California has CCPA. The theories are fine. The practice is a mess.
Ribeiro is candid about the shortcomings on both sides of the Atlantic.
“What we did in Europe was very important from a regulatory perspective, but not with so much enforceability. Enforceability has been slow,” he says.
In the United States, the problem is fragmentation and an almost comical over reliance on “consent.”
“We are solving it through consent. And consent is not the solution for this, because you go to a web page and you see 100 and whatever different vendors that are there. What capability do you have as a consumer to look at 100 pages times 100 vendors? So you just press accept all or reject all.”
If your idea of governance is “the user clicked accept,” you are outsourcing your risk decisions to people who have neither the time nor the context to understand what they are accepting. It is a legal fig leaf, not a security control.
JScrambler’s answer is straightforward: stop pretending the legal paperwork is enough, and start enforcing behavior where it matters.
“We need to have enforcement,” Ribeiro argues, “and enforcement starts immediately at the moment where you define, I’m working with company A, it’s a video player. I’m adding it to play some small video about children that are happy, whatever, selling a credit card, whatever is the objective. But I’m not expecting this company to ever send any information to any server, access any form data, because it should not.”
Same code, different context. On Netflix asking for login data is normal. On your banking portal, it is a disaster. The browser does not know the difference. JScrambler’s platform is designed to enforce that difference.
Security That Lets The Business Move Faster

One familiar complaint about security is that it slows everything down. Developers see it as friction. Marketing sees it as an obstacle between them and the next campaign. Business leaders see it as a cost center that mostly says no.
Ribeiro takes that stereotype head on.
“We kind of are security that allows them to innovate,” he says. “Which is kind of weird, because most of the time, security is seen as like a new layer. You block it and you make everything slow.”
By defining clear, human readable policies about what vendors and scripts are allowed to do, and then enforcing those policies in real time, JScrambler gives teams permission to move faster with less fear.
- Marketing can add new tags, pixels, and personalization tools within defined guardrails
- Development teams can ship rich, complex front ends without guessing about client side risk
- Security and privacy can be confident that data is not bleeding into the ad tech abyss
“That is why we focus so much on this language that the end user understands,” Ribeiro says. “What you expect this provider to access in terms of information, what you want him to access, what you do not want him to access, and implement the policy. Set and forget and the story.”
Of course, people will still make mistakes. Pixels will still be misconfigured. Vendors will still push updates that reach further than anyone expected. The point is that a misconfigured tag should trigger a policy violation, not an incident response war room six months later.
Go To Market: Deep Focus On High Stakes Sectors
JScrambler does not try to be all things to all companies. Their focus is on organizations that already understand that client side risk is a board level issue.
“We are very focused on very specific big enterprises,” Ribeiro says. “They understand, they have the concerns, they have the teams that are worried about data, the integrity of the applications and all of that.”
The company has a strong track record in stopping credit card skimming, but they position themselves well beyond that narrow problem. Primary target sectors include:
- E commerce and online marketplaces
- Healthcare providers and health tech platforms
- Banking and financial services
- Travel and airlines
JScrambler sells both directly and through partners, with a model that is intentionally “light touch.” This is not a three month consulting engagement that vanishes when the PowerPoint is done.
“We mainly start with a kind of discovery phase,” Ribeiro explains. “We implement this, this is what we have found, it is the lay of the land. You want to leave it like this, or you want to start enforcing policies, and it becomes an interactive process.”
Because the policies are expressed in terms that business and digital teams can understand, JScrambler can just as easily engage a CISO as a digital leader or product owner. The complexity happens under the hood. The front end is about straightforward questions:
- What data is critical?
- Which vendors should be allowed to see it?
- Where should scripts be sandboxed and restricted?
Why CISOs Should Care Now
If you are a CISO or security leader, there are plenty of noisy vendors chasing your attention. JScrambler’s pitch is not that you need one more dashboard. It is that you have a blind spot at the exact point where your business meets your customer, and adversaries plus ad tech are already exploiting it.
This is not just about regulatory fines, although GDPR and CCPA will happily provide those. It is about competitive advantage. The more of your customer data leaks into a third party ecosystem you do not control, the less unique your business becomes.
As Ribeiro puts it, many companies are “instrumentalizing everyone to compete against themselves,” paying handsomely to send their most valuable signals into platforms that also serve their rivals.
That is not smart security, and it is not smart business.
A Call To Action For Security Leaders
If your web, mobile, or digital teams rely on a dense network of third party scripts, martech integrations, and personalization engines, then you already have a client side supply chain. The only real question is whether you have any idea what it is doing.
Here are concrete next steps for CISOs and senior security leaders:
- Inventory your client side supply chain
Ask your teams for a current catalog of third party scripts and tags running across your key properties. If that request triggers nervous shuffling and vague answers, you have your first signal. - Assess where sensitive data meets third party code
Identify forms and flows that collect payment data, health information, credentials, or high sensitivity personal identifiers. Map which scripts can touch those elements in the DOM. - Move beyond “consent” as your main control
Review whether your current governance model simply assumes that a consent banner solves the problem. If your controls begin and end at “the user clicked accept,” you are running on faith, not enforcement. - Evaluate technologies that enforce behavior in the browser
Solutions like JScrambler that sandbox third party JavaScript, enforce per vendor policies, and monitor for overreach are quickly becoming table stakes for mature programs. Evaluate how they could complement your existing WAF, RASP, and DLP investments. - Treat client side security as an enabler, not an obstacle
Frame this as a way for marketing, product, and digital teams to move faster with guardrails, instead of yet another “no” from security. When the browser is under control, experimentation becomes less risky.
JScrambler has been working on this “new edge” long enough to know that ignoring it does not make the problem go away. It just makes the attackers and the ad tech very happy.
For CISOs who are serious about modernizing their security posture for AI driven, hyper personalized, browser heavy experiences, it is time to pull the browser into the security architecture as a first class citizen.
Client side integrity, sandboxing, and policy enforcement are no longer nice to have. They are how you stop your own stack from quietly training the rest of the industry on your customers.
Author’s Note
The author sat down with Rui Ribeiro, CEO of JScrambler, at the 2026 RSA Conference in San Francisco, held March 23rd to 25th, 2026, to discuss how the company is redefining client-side security at the browser “new edge” and what that means for CISOs facing an increasingly complex web supply chain.
For more information, please visit https://jscrambler.com
About the Author
Pete Green is the CISO / CTO of Anvil Works, a ProCloud SaaS company and co-author of “The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Businesses (SMBs)”. With over 25 years of experience in information technology and cybersecurity, Pete is a seasoned and accomplished security practitioner.
Throughout his career, he has held a wide range of technical and leadership roles, including LAN/WLAN Engineer, Threat Analyst, Security Project Manager, Security Architect, Cloud Security Architect, Principal Security Consultant, Director of IT, CTO, CEO, Virtual CISO, and CISO.
Pete has supported clients across numerous industries, including federal, state, and local government, as well as financial services, healthcare, food services, manufacturing, technology, transportation, and hospitality.
He holds a Master of Computer Information Systems in Information Security from Boston University, which is recognized as a National Center of Academic Excellence in Information Assurance / Cyber Defense (CAE IA/CD) by the NSA and DHS. He also holds a Master of Business Administration in Informatics.
