Identity & Security
From Idea to Standard: How the JWT Profile for OAuth 2.0 Access Tokens Became RFC9068
How To Protect Against Ransomware In 2021
What is Smishing?
How Social Engineering Has (And Hasn’t) Evolved Over Time
Should You Give Users Access Before They Register
The business case for lazy registration
Top 6 Cybersecurity Predictions for 2022
Security leaders will increase visibility and diversity of thought to meet consumer (and business) expectations
A Tour Through the OWASP Top 10
A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month
The Future of Healthcare Relies on Adaptation
Interoperability, liberating patient data, and the identity lynchpin
What Your Customers Really Want From Your Login Box
Taking a closer look at our recent YouGov survey results
How to Explain Public-Key Cryptography and Digital Signatures to Anyone
Here’s an easy-to-understand analogy to help your non-technical friends and customers understand public keys and private keys, and how they relate to cryptography and digital signatures.
4 Authentication Tools That Increase Retail Conversion Rates
How to decrease abandoned carts by improving the simplicity and security of your user login process.
Why Phishing Attacks Work
Auth0 No-Code Actions Integrations Now Available in Beta