Identity & Security
OAuth
From Idea to Standard: How the JWT Profile for OAuth 2.0 Access Tokens Became RFC9068
Ransomware
How To Protect Against Ransomware In 2021
Smishing
What is Smishing?
NCSAM
How Social Engineering Has (And Hasn’t) Evolved Over Time
Secure Access
Should You Give Users Access Before They Register
The business case for lazy registration
Predictions
Top 6 Cybersecurity Predictions for 2022
Security leaders will increase visibility and diversity of thought to meet consumer (and business) expectations
OWASP
A Tour Through the OWASP Top 10
A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month
Healthcare
The Future of Healthcare Relies on Adaptation
Interoperability, liberating patient data, and the identity lynchpin
Customer Experience
What Your Customers Really Want From Your Login Box
Taking a closer look at our recent YouGov survey results
Cybersecurity
How to Explain Public-Key Cryptography and Digital Signatures to Anyone
Here’s an easy-to-understand analogy to help your non-technical friends and customers understand public keys and private keys, and how they relate to cryptography and digital signatures.
Authentication
4 Authentication Tools That Increase Retail Conversion Rates
How to decrease abandoned carts by improving the simplicity and security of your user login process.
Phishing
Why Phishing Attacks Work
Integration
Auth0 No-Code Actions Integrations Now Available in Beta