Identity & Security
- Social Login
Social Login On The Rise: How Secure Is It?
- JWT
Why You Should Always Use Access Tokens to Secure an API
- SSO
Add SSO for Disqus on your WordPress Site with Auth0
- Authentication
Is Passwordless Authentication More Secure Than Passwords?
- Vulnerabilities
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.
- Innovation Labs
Why Identity Matters for Innovation Labs
Learn about identity innovations, and why identity matters for innovation labs.
- Predictions
Analyzing Identity in Movies
As technology becomes more advanced, movies are predictors of how our identity will be utilized.
- IAM
5 Reasons Your Company Needs Identity and Access Management
From revenue to employee happiness, identity management has more to offer than you might think.
- Vulnerabilities
Critical Vulnerability in JSON Web Encryption
JSON Web Encryption is vulnerable to a classic Invalid Curve Attack. Learn how this may affect you and what to do about it.
- Breaches
Cloudpets Data Breach Affects Over 820,000 Customers
An unsecured database allowed hackers to steal personal information from over 820,000 Cloudpets customers. Learn how this may affect you and what to do next.
- Vulnerabilities
What Cloudbleed Means for You and Your Customers
Tavis Ormandy, a vulnerability researcher at Google, discovered that Cloudflare was accidentally leaking sensitive data including passwords, private messages, and more. Learn how this may affect you and your customers and what to do next.
- Algorithms
SHA-1 Has Been Compromised In Practice
- MFA
Is Multifactor Authentication The Best Way To Secure Your Accounts? Myths And Reality