Identity & Security
- Breaches
How Poor Identity Access Management Equals Security Breaches
- IDaaS
5 Massive Benefits Of Identity As A Service For Developers
- Breaches
4 Security Measures Companies Implement After a Breach
- Security Questions
Are Your Security Questions As Safe As You Think?
- User Experience
Should You Make Your Users Log In?
Pros, cons, and exceptions to asking users to create an account.
- OAuth2
OAuth 2.0 Best Practices for Native Apps
The IETF has released Best Current Practice (BCP) for OAuth 2.0 in native apps. Learn about it now.
- Vulnerabilities
WPA2 KRACK Attack: The WiFi Hack and What it Means
A new security vulnerability has been found in the WPA2 WiFi protocol. We will look at the details of this, and how to mitigate it.
- FaceID
Is FaceID Really Secure?
Learn about the technology and security implications regarding Apple's FaceID.
- Productivity
Enhancing Productivity With Identity and Access Management
Security measures should augment productivity, not impede it
- Breaches
Breached Password Detection: Protect Your Users’ Data Before It’s Too Late
Recent breach affecting up to 711M email addresses shows critical need for protection and detection.
- Breaches
Equifax Data Breach Compromises 143 Million People
Personal identifying information was compromised for 143 million Americans in a massive Equifax data breach from May to July, 2017.
- Mitigations
How to Not Get Your Identity Stolen
- Authentication
Why You Should Not Manage Your Users' Identities