Identity & Security
Yahoo Confirms Data Breach of Half a Billion User Accounts
Yahoo has confirmed that in late 2014, at least 500 million user accounts were stolen in a large-scale data breach, exposing names, emails, and more.
Web-Proxy Auto Discovery (WPAD) Considered Harmful
WPAD + Proxy Automatic Configuration (PAC) can be used to thwart HTTPS protected URLs
Gotta Catch'em All: Pokémon GO Catches All Your Data!
A potential programming mistake raises unexpected privacy concerns among users
Avoiding Password Reuse Attacks with Auth0
Anomaly Detection can protect your users from password reuse attacks
JWT 101 Webinar Video-- learn more about JSON Web Tokens
This is transcript and recording of a JSON Web Tokens 101 Webinar we ran a few weeks ago.
Cookies vs Tokens: The Definitive Guide
The cookie vs token debate favors token-based authentication. Learn the advantages and get answers to common concerns regarding token authentication.
Why Federated Identity Management Matters
With an identity clearinghouse, you can stay focused on your business, not figuring out who your users are.
How Passwordless SMS Authentication Can Improve Your App
Enhancing Your App's security through SMS Authentication in simple steps
Everything You Wanted to Know About OAuth 2
This is the recording and transcription of a webinar we ran about OAuth 2 recently.
How To Safely Use The 3 Best Customer Retention Tactics
Making security your best Customer Retention Hack
Integrate Auth0 Into Your Existing SaaS Tools
Using Auth0 Rules, all your SaaS tools can become part of your authentication procedure
Data Breach Response Plan - Your Startup Needs one
Security is a challenge at most startups. Here's some advice on how to create a data breach response plan for the worst case scenario, a large-scale data breach.
The New Trend of Artisanal Spam: Scamming Gets Smart
Spam email hardly ever makes it to your inbox, and even when it does, you can't be fooled by it, right? Think twice, as 'artisanal spam' has arrived.