Webinar

Are You Properly Using JWTs?

January 30, 2020

Webinar Thumb Preview-1024x585px copy

JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT are often mis-used and incorrectly handled. Massive data breaches have occurred in the last 18 months due to token leakage and lack of proper of validation.

This session focuses on best practices and real-world examples of JWT usage, where we cover:

    • Typical scenarios where using JWT is a good idea
    • Typical scenarios where using JWT is a bad idea!
    • Principles of Zero trust architecture and why you should always validate
    • Best practices to thoroughly validate JWTs and potential vulnerabilities if you don’t.
    • Use cases when encryption may be required for JWT

Speaker

Phil-webinar
Philippe Leothaud

CTO and Co-founder

 

Watch the Webinar

Browse the Deck

Latest Resources

BLOG

Securing Model Context Protocol (MCP)

By Anthony Lonergan | November 18, 2025

How MCP’s contract-based design promotes automated tool discovery and secure execution Since its introduction, the Model Context Protocol (MCP) has enjoyed widespread adoption, with new servers and registries appearing at a relentless pace. Now organizations are racing to evolve their technology strategies to keep up with the latest […]

NEWS

42Crunch Surpasses 2 Million Downloads, Launches New Freemium Offering and Expands Availability to Microsoft Security Store

By Newsdesk | November 19, 2025

San Francisco, CA — November 19, 2025 — 42Crunch, the leader in DevSecOps for API security, today announced that its freely available API security testing tools for developers—integrated directly into popular IDEs including VS Code, JetBrains, and Eclipse—has surpassed the 2 million downloads worldwide. This milestone reflects the […]

DataSheet

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developers’ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

Secure Your APIs Today

#1 API security platform