As companies increasingly turn to AI-driven systems to support customer interactions through systems like chatbots and streamline operations, Retrieval-Augmented Generation (RAG) has become a popular framework for enhancing large language models (LLM...
I have spent much of the past two months on the road speaking with organizations of all industries about their AI application initiatives and I am struck both by their techno optimism and by the depth of their security concerns. The pace of innovatio...
In recent years, large language models (LLMs) like GPT-3 and GPT-4 have revolutionized how enterprises, especially in healthcare and finance, process and interact with data. These models enhance customer support, automate decision-making, and generat...
All of access control comes down to one fundamental question: How do we grant the right access to the right things to the right people and systems for the right amount of time? Every other question addresses an aspect or nuance within that question. ...
Your data has been exposed—and not because of a classic bug, but because your LLM accidentally leaked it. Sensitive information disclosure is a growing concern, especially with the rise of Large Language Models (LLMs) in our apps. This vulnerability ...
"Your data may have been exposed". The reason you hear this statement is to meet compliance with the Health Insurance Portability and Accountability Act (HIPAA). This law is a critical aspect of protecting sensitive patient information and identifia...
Thanks to everyone who participated in the Pangea Securathon Showdown hosted on Devpost! I was blown away by the 470+ registrants and the distinctive collection of projects that users submitted in just 6 short weeks. Your contributions creatively cov...
We are so excited to sponsor this year’s Gartner Application Innovation & Business Solutions Summit May 14 - 16 in Las Vegas! We will be in booth #419 right outside Theater 1 ready to give Pangea demos, discuss the latest security trends, and meet w...
To Me, hackathons embody the excitement of the possible. Until the last submission comes in you never know what amazing works of art will come through and how it can open your eyes to solving problems in creative and unique ways. Even after my experi...
In today's app-centric landscape, security is fundamental. While there isn't a single portion of our life untouched by technology, we're still stuck with the decades-old security practices of passwords. At Pangea, we're excited to improve our custome...
In the world where hackers are trying to brute force user accounts (23andMe breach 2023) and session tokens are being stolen (OKTA breach 2023) to impersonate authenticated users and run critical user actions, it is highly important for developers to...
Last week I had the rare and exciting opportunity to visit Capitol Hill to represent Pangea in a Cyber & Digital Identity Innovation Day organized by Okta. Pangea was one of several portfolio companies from Okta Ventures who were invited to participa...
When I say “secure authentication,” what comes to mind? You probably think of SSL, password policies, and MFA. Those are a good starting point but what if we could look into the authentication request itself? What if we could use that request context...
✍ This article was written by guest author Joel W. King Overview Infrastructure automation projects frequently involve including and managing user credentials, user ids, telephone numbers, and email addresses for both employees and often for extern...
Thanks to everyone who participated in the November Pangea Securathon! I was blown away by the 300+ registrants and the diverse array of projects that you submitted in just a short 2 weeks. Your contributions covered such a broad set of ideas and sho...
$5 doesn’t seem like a lot of money these days. For example, depending on where you are in the U.S. a McDonald’s Happy Meal could be $7.89 in New York City and other major cities, but closer to $5 in other areas like Iowa. "Happy Meal" by happymealy...
When we think about Authentication, every developer has one of two reactions: The first is “I’ve got this'' and they quickly slap together a database and form and call it complete. Then they think about password hashing, account reset flows, and send...
Introducing Pangea File Scan Have you ever been working on an app that accepts file uploads? What does your app do with those files? Where do those files come from? Where do they go? Who handles those files, and what do they do with them? Is it ...
SOC 2 Type 2
HIPAA Compliant
ISO/IEC 27001
ISO/IEC 27701
Use Cases
Case Studies
Services
Developers
Explore
Connect
Service Status
Company
636 Ramona St, Palo Alto, CA 94301
Pangea is a Sample Vendor for Composable Security APIs in the 2024 App Sec Hype Cycle™ report