Identity & Security
Everything You Wanted to Know About OAuth 2
This is the recording and transcription of a webinar we ran about OAuth 2 recently.
How To Safely Use The 3 Best Customer Retention Tactics
Making security your best Customer Retention Hack
Integrate Auth0 Into Your Existing SaaS Tools
Using Auth0 Rules, all your SaaS tools can become part of your authentication procedure
Data Breach Response Plan - Your Startup Needs one
Security is a challenge at most startups. Here's some advice on how to create a data breach response plan for the worst case scenario, a large-scale data breach.
The New Trend of Artisanal Spam: Scamming Gets Smart
Spam email hardly ever makes it to your inbox, and even when it does, you can't be fooled by it, right? Think twice, as 'artisanal spam' has arrived.
What 3 Security Stories of 2015 Can Tell About Security
Here’s why SaaS companies should be offering their premium security features to everyone next year.
JSON Web Token (JWT) Signing Algorithms Overview
Learn all about the different JWT signing algorithms and how to choose the correct one for your use case!
Security trends for 2016
What we can expect in the upcoming year
Why Using Open Standards Helps Close More Enterprise Deals
Contrary to popular belief, reducing vendor lock-in helps gaining enterprise customers
Top 5 Cyber Monday Security Threats and What To Do About Them
Five tips that will help you to shop safely from your home during the sale season
Surprised? Turns out, consumers don’t trust IoT security
What customers and developers think of IoT security
5 Ways to Make Your App More Secure in Less than 20 Minutes
Refresh Tokens: When to Use Them and How They Interact with JWTs
Learn about refresh tokens and how they fit in the modern web. Get a working sample of how to implement it with NodeJS