✍ This article was written by author Ian Forrest In my previous blog post, I wrote about how one might go about building a Tamperproof Logging Implementation. A good-sized chunk of that post was about how one could use Merkle Trees to verify the in...
Jun 21, 2022
✍ This article was written by author Ian Forrest There are many reasons to log events — for performance tracing, to understand user behavior, or for “just in case” scenarios where something goes wrong… or it could be for compliance. In my previous ...
Jun 15, 2022
Several months ago, I was diving deep into the concept of application security after spending years working on products for the practitioner side of enterprise security. During that period, it really started sinking into my mind that there is not a s...
Jun 8, 2022
In my 28+ years working in InfoSec/Cyber Security running worldwide sales, partners, OEM, and overall BD teams for several startups and mature cybersecurity companies, I observed a true paradigm shift in how companies short-list and procure software....
Jun 1, 2022
A Passion for Building Secure Products Like many of those who have founded companies in cybersecurity, my passion for security began long ago, in the days when hacking was still a gray area, sometimes turning into a job, and ultimately, a career in t...
May 17, 2022
✍ This article was written by author Ian Forrest Privacy and trust — two things that you can never have enough of. At the core of nearly every compliance framework is an effort to maintain privacy and increase trust. The privacy part is pretty easy...
May 13, 2022
SOC 2 Type 2
HIPAA Compliant
ISO/IEC 27001
ISO/IEC 27701
Use Cases
Case Studies
Services
Developers
Explore
Connect
Service Status
Company
636 Ramona St, Palo Alto, CA 94301
Pangea is a Sample Vendor for Composable Security APIs in the 2024 App Sec Hype Cycle™ report