How we plan to discourage insecure implementations of PASETO.
Why versioned protocols are superior to "cipher agility"-based cryptographic designs.
Your webserver can initiate HTTP requests too, and securing those matters a lot.
If you're planning on implementing the W3C and FIDO Alliance's new WebAuthn standard for hardware security token support, skip ECDAA for now.
How to build your own automatic update system that is verifiably secure.
How to implement field-level data encryption while still allowing fast queries.
JWT, JWE, JWS, etc. are terrible designs and need to be scrapped, not resuscitated.
A Brief Introduction to our Split Token Approach
Your field guide to building secure cryptography features in PHP
The perils and pitfalls involved with implementing public-key encryption in a PHP project, and how to do it right.
Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?
Our team of technology consultants have extensive knowledge and experience with application security and web/application development.
Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.
The first mails quarterly and often showcases our behind-the-scenes projects.
The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.