15 Aug 2016
In upcoming series of articles, we'll ascend from classic database security techniques to modern technologies, including some of the cutting edge research and our own experiments in the field.
27 Jul 2016
In this post, we talk about Zero-Knowledge Proofs, tie ZKP authentication to traditional security models and help you understand better how authentication, in general, should work.
20 Jul 2016
Lighter reading: general thoughts on how the familiar mindset of 'protect the perimeter' changed over time.