Identity & Security
- Innovation and Growth
Securing a Platform
- Vulnerabilities
Insomnia Security Disclosure
- Refresh Tokens Rotation
Securing Single Page Applications with Refresh Token Rotation
- Mitigations
How to Create an Actionable Pandemic Plan
- IAM
The High Cost of Doing Nothing
Outdated IAM can cost you in terms of analytics, security, and UX.
- Breaches
Equifax and the 147 Million: A Story from Behind the Headlines
A look at the long term impact of the Equifax data breach and how to protect yourself if your credentials are stolen
- Vulnerabilities
Developer's Guide to Common Vulnerabilities and How to Prevent Them
Learn how to prevent common vulnerabilities such as XSS, injection, and third-party vulnerabilities
- Reports
Top 5 Cybersecurity Predictions for 2020
Why credential stuffing, more data privacy regulation, and record attacks will require ‘old-fashioned’ work.
- Cloud Automation
Guardians of the Cloud: Automating the Response to Security Events
Discover how Auth0 uses security automation to respond to GuardDuty events at scale and our learnings in the process
- Browser Changes
Upcoming Browser Behavior Changes: What Developers Need to Know
Learn about upcoming changes to browser cookie behavior that may make your web applications incompatible.
- History
The Alexander the Great Guide to InfoSec for the C-Suite
Auth0 CISO Joan D. Pepin on how we can still apply the security principles that helped Alexander the Great conquer the world
- OpenID Connect
The OpenID Connect Handbook
- Email Reputation
Checking Users Email Reputation Score During Authentication