Identity & Security

Latest posts (10 of 383 results)

identity & security

Jan 22, 2026 • 8 min read

Why Broken Access Control Still Dominates the OWASP Top 10 in 2026?

Andrea Chiarelli

identity & security

Jan 15, 2026 • 7 min read

The API Authorization Hierarchy of Needs: Why You Aren’t Ready for AI Agents Yet

Andrés Aguiar

identity & security

Dec 19, 2025 • 7 min read

Why MCP’s Move Away from Server-Sent Events Simplifies Security

Will Johnson

identity & security

Dec 18, 2025 • 4 min read

Bulletproof Hosting Defense: Mitigating the Proxy Threat with Threat Intelligence

Khush Kaushal, Mathew Woodyard

identity & security

Dec 9, 2025 • 10 min read

Using an API Gateway with Fine-Grained Authorization

Carla Urrea Stabile

identity & security

Nov 21, 2025 • 26 min read

A Comprehensive Guide to Auth0 Security Against Identity Attacks

Maria Vasilevskaya

identity & security

Nov 14, 2025 • 14 min read

Proactive Auth0 Security Posture via Real-Time Audit of Management API Logs

Maria Vasilevskaya

identity & security

Oct 31, 2025 • 12 min read

8 Log Detections for Credential Stuffing and MFA Exploit Prevention

Maria Vasilevskaya

identity & security

Oct 8, 2025 • 13 min read

Refresh Token Security: Detecting Hijacking and Misuse with Auth0

Maria Vasilevskaya

identity & security

Sep 24, 2025 • 6 min read

Detecting Signup Fraud: 3 Ways to Use Auth0 Logs to Protect Your Business

Maria Vasilevskaya

Load more

Try for free today

Stop reading and start building.