CurityBest Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.14 min read·Apr 19, 2024----
Curity3 Steps to Make Logins with Passkeys ReliablePasskeys are a modern and secure way for users to authenticate. Here is how to make passkey authentication reliable.4 min read·Apr 8, 2024--1--1
Curity10 Best Practices for Building a Robust IAM Strategy in 2024A look at some of the common IAM challenges organizations face and suggestions for implementing a solid strategy for the new year.10 min read·Mar 5, 2024----
CurityGetting Identity and Authz Right in KubernetesStart by capturing business requirements, then add an architectural design that puts security in the hands of engineers8 min read·Feb 13, 2024----
CurityI Have a Verifiable Credential, Now What?Decentralized identities and verifiable credentials: use cases and where they won’t help8 min read·Jan 25, 2024----
CurityOAuth.Tools: The Online Tool That Goes beyond JWTsHow to use OAuth.Tools to decode or create JWTs with different characteristics, fetch tokens from a server, revoke tokens and more5 min read·Jan 5, 2024----
CurityHow to Design Scalable SaaS API SecurityWhen designing SaaS solutions, a security-first approach enables the best business outcomes.6 min read·Dec 15, 2023----
CurityHow to Integrate Social Logins the Right WayA guide to creating a solution that avoids security pitfalls, scales well to many components, and is easily extendable6 min read·Nov 10, 2023----
CuritySupply Chain Attacks: How to Mitigate OAuth Token TheftWith the rising dependency on SaaS services and token-based access comes great flexibility but also dangers that need to be mitigated.4 min read·Oct 13, 2023----
CurityHow DevSecOps Teams Should Approach API SecurityA recommended setup that addresses the unique concerns of developers, security and DevOps teams.7 min read·Aug 28, 2023----