Identity & Security
- IAM
5 Reasons Your Company Needs Identity and Access Management
- Vulnerabilities
Critical Vulnerability in JSON Web Encryption
- Breaches
Cloudpets Data Breach Affects Over 820,000 Customers
- Vulnerabilities
What Cloudbleed Means for You and Your Customers
- Algorithms
SHA-1 Has Been Compromised In Practice
The CWI Institute and Google have successfully demonstrated a practical SHA-1 collision attack by publishing two unique PDF files that produce the same hash value.
- MFA
Is Multifactor Authentication The Best Way To Secure Your Accounts? Myths And Reality
Multifactor authentication is important, but the question of implementation is more complex than it seems.
- Enterprise Federation
How Enterprise Federation Helps Shorten The Sales Cycle
Optimizing your login for enterprise customers can help you save time and close deals.
- Analytics
How To Build Your User Analytics Funnel With Social Login
How to collect, send and analyze your user data for growth
- Authentication
Risks Posed By Legacy Authentication Webinar
Username and password are not enough. So why do most companies still use them?
- Personal Guide
Personal Information Security Guide for Family and Friends
Help your family and friends being secure with this printable security guide
- Mobile
Could your iPhone get stolen while it's unlocked?
How to prevent criminals to mess with your accounts
- SAML
How SAML Authentication Works
- Authentication
Modern Authentication for Your Clients Made Easy