The GDPR is a complex regulation, but at its most basic level it requires organizations to provide “data protection by design and default.” FusionAuth is built with a powerful REST API that gives developers the tools they need to adhere to the requirements of the GDPR quickly and easily. On May 23, 2018 FusionAuth’s CEO Brian Pontarelli presented to Colorado’s technology leaders about how the GDPR and data privacy will affect US companies, and went into detail about how the FusionAuth API is well-suited to help companies stay GDPR compliant and avoid risks of fines and data restrictions for data protection violations.
Get the latest updates on FusionAuth, security, general coding and major geekery here.
Getting Started with Email Templates in FusionAuthFeb 28th, 2019byRead More
The email templates in FusionAuth can be customized allowing you to present a consistent brand across all customer touch points. In this post, we show you how to set up the email templates to be ready to use FusionAuth’s integrated email features.
Got Users? How About 100 Million of Them?Feb 26th, 2019byRead More
FusionAuth User Registration Hits 100,000,000 in Load Test
Did you know that each time you log into Facebook, check your email or fire up Fortnite, a software engineer has thought about user registration and authentication. Hopefully she has thought a lot about it. For example, what happens if Call of Duty goes offline for maintenance and then six million users try to log back in at the same time? It could take days for users to get back online if peak loads aren’t planned for.
FusionAuth Reviews from Around the WorldFeb 25th, 2019byRead More
It’s been only a few months since we launched FusionAuth and the reviews are coming in from all over. So far, developers are loving it! What’s not to love? We designed FusionAuth to deploy in seconds, integrate with any codebase, and run anywhere on any platform.
Save a CPU - Ditch BCrypt, use SHA2 insteadFeb 21st, 2019byRead More
Here’s the reality, billions of credentials have been leaked or stolen and are now easily downloaded online by anyone. Many of these databases of identities include passwords in plain text, while others are one-way hashed. One-way hashing is better (we’ll get to why in a second), but it is only as secure as is mathematically feasible. Let’s take a look at one-way hashing algorithms and how computers handle them.