{
    "componentChunkName": "component---src-templates-author-page-js",
    "path": "/author/marcin-szostak/",
    "result": {"data":{"markdownRemark":{"id":"9c6b99fb-4b08-53e1-b1d9-101fe9d05c56","fields":{"slug":"/authors/marcin-szostak/"},"frontmatter":{"title":"Marcin Szostak","slug":"marcin-szostak","job":"PHP Developer","photo":"/img/my_image.jpg","isExternalAuthor":null,"description":null,"noIndex":false}},"posts":{"edges":[{"node":{"fields":{"slug":"/blog/how-to-implement-argon2-into-symfony-jwt-authentication/"},"frontmatter":{"title":"How to implement Argon2 into Symfony JWT authentication?","templateKey":"article-page","service":null,"cover":"https://res.cloudinary.com/de4rvmslk/image/upload/v1661259754/img/Symfony_JWT_authentication.png","box":{"content":{"tileDescription":"In this article, you’ll find an explanation of how the Argon2 password hashing algorithm can be implemented into a Symfony-based application. The algorithm is used to encrypt passwords and store them in a safe place. We will show you a practical example of processing it, step by step.","coverImage":""}},"settings":{"date":"2022-08-23T17:40:00.000Z","slug":"how-to-implement-argon2-into-symfony-jwt-authentication","slugType":null,"url":null,"category":null}}}},{"node":{"fields":{"slug":"/blog/the-owasp-top-10-and-its-impact-on-web-development-in-2022/"},"frontmatter":{"title":"The OWASP Top 10 and its impact on web development in 2022","templateKey":"article-page","service":null,"cover":"/img/owasp-top-10-2022.jpg","box":{"content":{"tileDescription":"The OWASP Foundation exists to improve software security worldwide. Every four years their global community  publishes a list of the most dangerous security threats in the world. As a developer, I knew some of them already, however in this article I would like to walk you through each security threat that made it onto the newest OWASP Top 10 list.\n","coverImage":""}},"settings":{"date":"2022-05-16T20:27:37.802Z","slug":"owasp-top-10-2022","slugType":null,"url":null,"category":null}}}},{"node":{"fields":{"slug":"/blog/encryption-of-sensitive-data-with-a-symmetric-key/"},"frontmatter":{"title":"Encryption of sensitive data with a symmetric key","templateKey":"article-page","service":null,"cover":"/img/Encryption_of_sensitive_data_1.jpg","box":{"content":{"tileDescription":"Protecting your database has never been more important. Your API keys, card information or even invoices can be a prime target for a cybernetic attack. In this article, I will talk about making your data unreadable to hackers using symmetric key encryption. Read on to find out what it is and when you should consider it.","coverImage":"/img/Encryption_of_sensitive_data_1.jpg"}},"settings":{"date":"2022-04-27T16:33:19.075Z","slug":"symmetric-key-encryption","slugType":null,"url":null,"category":null}}}},{"node":{"fields":{"slug":"/blog/how-to-improve-user-password-security-with-argon2/"},"frontmatter":{"title":"How to improve user password security with Argon2?","templateKey":"article-page","service":null,"cover":"/img/Argon_1.jpg","box":{"content":{"tileDescription":"Even the best digital products are at risk of cyber attacks and while a strong password can help with protecting your digital assets, it’s not a foolproof method. Learn how to use the Argon2 algorithm to prevent passwords from being cracked.","coverImage":""}},"settings":{"date":"2022-04-19T14:14:32.943Z","slug":"how-to-improve-user-password-security-with-argon2","slugType":null,"url":null,"category":null}}}}]}},"pageContext":{"id":"9c6b99fb-4b08-53e1-b1d9-101fe9d05c56","slug":"marcin-szostak","authorTitle":"Marcin Szostak"}},
    "staticQueryHashes": []}