Deserializing a string into a data structure is a simple task riddled with security holes.
The beta release for a secure-by-default CMS built by Paragon Initiative Enterprises
The answer to a very frequently asked question that most people in the industry know without needing to read this.
How to authenticate a user on multiple domains without violating the Same Origin Policy.
A short meditation on the role of security engineering in software development
Salted Password Hashing with Argon2, Scrypt, Bcrypt, and PBKDF2
Or: How I won the password hashing category for the Underhanded Crypto Contest at DEFCON 23.
Or: How I learned to stop worrying and love software exploitation.
There are three forms of dishonesty: Lies, damned lies, and security trade-offs.
If you're wondering which cryptography library you should use in your project, this should help make the decision easier.
Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?
Our team of technology consultants have extensive knowledge and experience with application security and web/application development.
Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.
The first mails quarterly and often showcases our behind-the-scenes projects.
The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.