Webinar

Are You Properly Using JWTs?

January 30, 2020

Webinar Thumb Preview-1024x585px copy

JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT are often mis-used and incorrectly handled. Massive data breaches have occurred in the last 18 months due to token leakage and lack of proper of validation.

This session focuses on best practices and real-world examples of JWT usage, where we cover:

    • Typical scenarios where using JWT is a good idea
    • Typical scenarios where using JWT is a bad idea!
    • Principles of Zero trust architecture and why you should always validate
    • Best practices to thoroughly validate JWTs and potential vulnerabilities if you don’t.
    • Use cases when encryption may be required for JWT

Speaker

Phil-webinar
Philippe Leothaud

CTO and Co-founder

 

Watch the Webinar

Browse the Deck

Latest Resources

BLOG

Securing Model Context Protocol (MCP)

By Anthony Lonergan | November 18, 2025

How MCP’s contract-based design promotes automated tool discovery and secure execution Since its introduction, the Model Context Protocol (MCP) has enjoyed widespread adoption, with new servers and registries appearing at a relentless pace. Now organizations are racing to evolve their technology strategies to keep up with the latest […]

NEWS

42Crunch Launches API Contract Generator in Developer IDEs

By Mark Dolan | January 19, 2026

San Francisco, CA – January 19 2026 – 42Crunch announced the availability of API Contract Generator in developer IDEs, designed to speed up the creation of OpenAPI documentation. By leveraging existing Postman Collections and network traffic (HAR files), companies can now accelerate the documentation of their APIs by […]

DataSheet

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developers’ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

Secure Your APIs Today

#1 API security platform