If you're planning on implementing the W3C and FIDO Alliance's new WebAuthn standard for hardware security token support, skip ECDAA for now.
Deserializing a string into a data structure is a simple task riddled with security holes.
Or: How I won the password hashing category for the Underhanded Crypto Contest at DEFCON 23.
What is the potential impact of a given vulnerability? This isn't easy to answer.
Although Cross-Site Scripting is one of the most common vulnerabilities on the Internet, it remains an unsolved problem (unlike SQL Injection).
It's 2015; there's no excuse for writing code vulnerable to SQL Injection any more
How to configure and use PHP's build-in session management system for maximum security.
Will tomorrow bring costly and embarrassing data breaches? Or will it bring growth, success, and peace of mind?
Our team of technology consultants have extensive knowledge and experience with application security and web/application development.
Want the latest from Paragon Initiative Enterprises delivered straight to your inbox? We have two newsletters to choose from.
The first mails quarterly and often showcases our behind-the-scenes projects.
The other is unscheduled and gives you a direct feed into the findings of our open source security research initiatives.