Identity & Security
- Breaches
Data Breaches by the Numbers
- Phishing
All You Need To Know About The Google Docs Phishing Attack
- Biometrics
The State of Biometric Identity in 2017
- Profile Enrichment
How Profile Enrichment and Progressive Profiling Can Boost Your Marketing
- Social Login
Social Login On The Rise: How Secure Is It?
Find out if social login is really all it's hyped up to be.
- JWT
Why You Should Always Use Access Tokens to Secure an API
We explain the difference between access token and ID token and why the latter should never be used to secure an API.
- SSO
Add SSO for Disqus on your WordPress Site with Auth0
Learn how utilize SSO for your Disqus WordPress plugin for your blog comments using Auth0 for authentication on the blog.
- Authentication
Is Passwordless Authentication More Secure Than Passwords?
When your users' behaviors determine the safety of your login, passwordless comes out on top.
- Vulnerabilities
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.
- Innovation Labs
Why Identity Matters for Innovation Labs
Learn about identity innovations, and why identity matters for innovation labs.
- Predictions
Analyzing Identity in Movies
As technology becomes more advanced, movies are predictors of how our identity will be utilized.
- IAM
5 Reasons Your Company Needs Identity and Access Management
- Vulnerabilities
Critical Vulnerability in JSON Web Encryption