4 API Security Best PracticesBy adding an API gateway and using OAuth or OpenID Connect to base authorization on access tokens, you can mitigate a bunch of top API…3d ago3d ago
Enhancing Security in Digital Banking: IAM Solutions for Combating APP FraudProtecting access to data and assets of challenger banks requires advanced IAM tactics that draw from the latest authentication practices.Oct 18Oct 18
How To Secure API Access in Mobile AppsBy using the OAuth 2.0 authorization framework, you can avoid expensive mistakes and enable the most up-to-date security behaviors in your…Aug 14Aug 14
5 Steps Toward Military-Grade API SecurityThe best way to secure digital services is to start with a solid foundation and then ramp up security to military grade when possible.Aug 2Aug 2
Best Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.Apr 193Apr 193
3 Steps to Make Logins with Passkeys ReliablePasskeys are a modern and secure way for users to authenticate. Here is how to make passkey authentication reliable.Apr 81Apr 81
10 Best Practices for Building a Robust IAM Strategy in 2024A look at some of the common IAM challenges organizations face and suggestions for implementing a solid strategy for the new year.Mar 5Mar 5
Getting Identity and Authz Right in KubernetesStart by capturing business requirements, then add an architectural design that puts security in the hands of engineersFeb 13Feb 13
I Have a Verifiable Credential, Now What?Decentralized identities and verifiable credentials: use cases and where they won’t helpJan 25Jan 25
OAuth.Tools: The Online Tool That Goes beyond JWTsHow to use OAuth.Tools to decode or create JWTs with different characteristics, fetch tokens from a server, revoke tokens and moreJan 5Jan 5