Identity & Security
The Firewall of the Future Is Identity
Focus your protection on the most precious assets
Go Beyond Username/Password with Modern Authentication
Learn how to leave usernames and passwords behind with social and passwordless authentication.
A Massive Ransomware Attack Targets Organizations Around the Globe
A global cyber-attack using leaked NSA tools is targeting organizations worldwide including UK's National Health Service, Spain's Telefonica telecom, and many more.
Google Blocks OAuth Requests Made Via Embedded Browsers
OAuth authorization requests made to Google via embedded browsers have been blocked by Google.
Data Breaches by the Numbers
By failing to plan for data breaches, you leave yourself vulnerable to inevitable attacks
All You Need To Know About The Google Docs Phishing Attack
Learn how the Google Docs Phishing Scam was perpetrated and how it could have been avoided.
The State of Biometric Identity in 2017
The good, the bad, and the future of Biometric Identity.
How Profile Enrichment and Progressive Profiling Can Boost Your Marketing
Learn how Profile Enrichment and Progressive Profiling help you target customers more effectively
Social Login On The Rise: How Secure Is It?
Find out if social login is really all it's hyped up to be.
Why You Should Always Use Access Tokens to Secure an API
We explain the difference between access token and ID token and why the latter should never be used to secure an API.
Add SSO for Disqus on your WordPress Site with Auth0
Learn how utilize SSO for your Disqus WordPress plugin for your blog comments using Auth0 for authentication on the blog.
Is Passwordless Authentication More Secure Than Passwords?
When your users' behaviors determine the safety of your login, passwordless comes out on top.
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.