Guide to User Data Security
Security is complex and for many software professionals an incredibly intimidating task that is easy to just ignore as a problem "outside the scope of requirements". This guide is for the developer who doesn't want to spend a lifetime wading through cryptographic algorithms and complicated explanations of arcane system administration topics to tackle software security.
Password Compliance Checklist
To help ensure stronger password security, leading organizations have published clear criteria to discourage users from selecting easy to guess passwords. We have assembled those criteria into one checklist of key password recommendations to help you evaluate and improve your own password policies.
The Math of Password Hashing Algorithms and Entropy
More credential databases are stolen every year. Many include passwords stored in plain text, while others are one-way hashed. One-way hashing is better, but it is only as secure as is mathematically feasible. Let's take a look at one-way hashing algorithms and how computers handle them.
FusionAuth is Auth Built for <devs>
FusionAuth gives devs complete flexibility with minimal implementation effort. Use our Fast Path install to get started in minutes.Get started
We got this. Go build the cool stuff.
FusionAuth in Your Inbox
Subscribe for email updates and you'll be the first to know about new features and updates. And don't worry, our emails are just like FusionAuth - built for devs. We skip the annoying fluff marketing messages and only send out when we have useful information.