The first in a two-part series. We establish a mathematical definition for popularity within a given dataset and build some abuse resistance into the algorithm design.
It's 2015; there's no excuse for writing code vulnerable to SQL Injection any more
Alternative title: "Libmcrypt considered harmful." You should use libsodium if you can, or OpenSSL if you can't.
A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP
Login forms with a remember me checkbox are a common requirement. We explore the security of login forms and a robust model for remember me checkboxes.
How to configure and use PHP's build-in session management system for maximum security.
Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?
Our team of technology consultants have extensive knowledge and experience with application security and web/application development.
Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.
The first mails quarterly and often showcases our behind-the-scenes projects.
The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.