Identity & Security
- Breaches
A Massive Ransomware Attack Targets Organizations Around the Globe
- Authorization
Google Blocks OAuth Requests Made Via Embedded Browsers
- Breaches
Data Breaches by the Numbers
- Phishing
All You Need To Know About The Google Docs Phishing Attack
- Biometrics
The State of Biometric Identity in 2017
The good, the bad, and the future of Biometric Identity.
- Profile Enrichment
How Profile Enrichment and Progressive Profiling Can Boost Your Marketing
Learn how Profile Enrichment and Progressive Profiling help you target customers more effectively
- Social Login
Social Login On The Rise: How Secure Is It?
Find out if social login is really all it's hyped up to be.
- JWT
Why You Should Always Use Access Tokens to Secure an API
We explain the difference between access token and ID token and why the latter should never be used to secure an API.
- SSO
Add SSO for Disqus on your WordPress Site with Auth0
Learn how utilize SSO for your Disqus WordPress plugin for your blog comments using Auth0 for authentication on the blog.
- Authentication
Is Passwordless Authentication More Secure Than Passwords?
When your users' behaviors determine the safety of your login, passwordless comes out on top.
- Vulnerabilities
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.
- Innovation Labs
Why Identity Matters for Innovation Labs
- Predictions
Analyzing Identity in Movies