
5 min. read
The road to Passbolt v5 - Getting started with the new resource types (beta)
Learn how to enable encrypted metadata in Passbolt v5 to benefit from advanced resource types and improved security.
5 min. read
Learn how to enable encrypted metadata in Passbolt v5 to benefit from advanced resource types and improved security.
4 min. read
Passbolt 5.3 introduces custom fields, allowing structured key-value data alongside credentials and includes performance enhancements.
8 min. read
Learn to set up a robust, highly-available Passbolt environment using Galera on Debian 12, ensuring reliable password management with minimal downtime.
3 min. read
Passbolt v5.2 brings personalised resource icons, multiple URIs per resource and adds Slovenian and Ukrainian language support. Check out all the details!
5 min. read
Passbolt 5.1 introduces encrypted resource metadata, extending end-to-end encryption to the context around credentials, like the name you give a password in passbolt or the URL where it’s used to log in.
7 min. read
Passbolt 5.0 is available now with a redesigned interface that is supposed to make it easier for teams to collaborate on access and credentials - whether in IT, DevOps or part of the broader workforce. This release lays the foundation for upcoming capabilities in the 5.x series.
5 min. read
This blog post outlines in detail what has changed or moved in the graphical user interface and provides comparison screenshots. It also previews new features and design updates set to roll out in the Passbolt 5.x series.
3 min. read
PHP powers passbolt and we’re thrilled to support the PHP Foundation as a Silver sponsor. Discover why we love PHP, what it means for the open source ecosystem, and how you can get involved.
6 min. read
In this TechRadar Pro opinion piece, discover tips for securing sensitive digital credentials.
5 min. read
Prepare your passbolt instance for the upcoming v5 release with its new PHP 8.2 requirement. This article explains why we're upgrading, which distributions are affected, and provides straightforward migration strategies to ensure your credentials management system stays secure and up-to-date.
3 min. read
This blog breaks down key findings from three independent assessments, reinforcing our commitment to strong security and compliance.