Identity & Security
- Breaches
How PayPal could have easily avoided the last account hack
- Trends
What 3 Security Stories of 2015 Can Tell About Security
- Mitigations
'Tis the Season for Cyber Criminals
- JWT
JSON Web Token (JWT) Signing Algorithms Overview
- Trends
Security trends for 2016
What we can expect in the upcoming year
- Open Standards
Why Using Open Standards Helps Close More Enterprise Deals
Contrary to popular belief, reducing vendor lock-in helps gaining enterprise customers
- Mitigations
Top 5 Cyber Monday Security Threats and What To Do About Them
Five tips that will help you to shop safely from your home during the sale season
- IoT
Surprised? Turns out, consumers don’t trust IoT security
What customers and developers think of IoT security
- Mitigations
5 Ways to Make Your App More Secure in Less than 20 Minutes
How to improve your app's security with features like MFA, encryption and more with just a few lines of Javascript.
- Open Standards
What Are Refresh Tokens and How to Use Them Securely
Learn about refresh tokens and how they help developers balance security and usability in their applications.
- JWT
5 Steps to Add Modern Authentication to Legacy Apps Using JWTs
Conventional authentication is challenging for today's web applications. Learn about the reasons and how to use JSON Web Tokens (JWT) for modern authentication.
- SSO
What Is Single Sign-On Authentication (SSO) And How Does It Work?
- JWT
JWT: 2 years later