Identity & Security
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Why Identity Matters for Innovation Labs
Analyzing Identity in Movies
5 Reasons Your Company Needs Identity and Access Management
Critical Vulnerability in JSON Web Encryption
JSON Web Encryption is vulnerable to a classic Invalid Curve Attack. Learn how this may affect you and what to do about it.
Cloudpets Data Breach Affects Over 820,000 Customers
An unsecured database allowed hackers to steal personal information from over 820,000 Cloudpets customers. Learn how this may affect you and what to do next.
What Cloudbleed Means for You and Your Customers
Tavis Ormandy, a vulnerability researcher at Google, discovered that Cloudflare was accidentally leaking sensitive data including passwords, private messages, and more. Learn how this may affect you and your customers and what to do next.
SHA-1 Has Been Compromised In Practice
The CWI Institute and Google have successfully demonstrated a practical SHA-1 collision attack by publishing two unique PDF files that produce the same hash value.
Is Multifactor Authentication The Best Way To Secure Your Accounts? Myths And Reality
Multifactor authentication is important, but the question of implementation is more complex than it seems.
How Enterprise Federation Helps Shorten The Sales Cycle
Optimizing your login for enterprise customers can help you save time and close deals.
How To Build Your User Analytics Funnel With Social Login
How to collect, send and analyze your user data for growth
Risks Posed By Legacy Authentication Webinar
Personal Information Security Guide for Family and Friends