Security

Security Articles

Security Articles
10 Steps To Secure Your Authentication System

10 Steps To Secure Your Authentication System

This article will break down some of the essential steps developers need to take to maintain a secure authentication system.

Auth Providers And The Zero Trust Architecture

Auth Providers And The Zero Trust Architecture

Learn about the Zero Trust framework and how Identity Providers factor into it to protect your network and keep your resources secure.

Breached Password Detection

Breached Password Detection

What is breached password detection and why should you implement it.

Exploring The Roles Of The Blue Team, The Red Team, And The Purple Team In Cybersecurity

Exploring The Roles Of The Blue Team, The Red Team, And The Purple Team In Cybersecurity

Learn about the roles and some of the tools of the Blue Team and Red Team, as well as the concept of the Purple Team.

Guide To User Data Security

Guide To User Data Security

Protect your user data with this step-by-step guide to secure your servers and applications.

How SSO Makes for A More Personalized User Experience

How SSO Makes for A More Personalized User Experience

This article explores various SSO scenarios and explains what benefits it brings to users and businesses in terms of security, user experience, and personalization.

Integrating Third-Party Services for Improved Identity Management

Integrating Third-Party Services for Improved Identity Management

Using well-known and trusted identity providers means your visitors are more likely to sign up for your application because it's easy to do *and* they don't need to entrust you with their passwords.

Password Security Compliance Checklist

Password Security Compliance Checklist

Use this combined checklist of leading password recommendations to strengthen your company's password security policy, meet compliance standards, and minimize the risk of data theft.

The Math of Password Hashing Algorithms And Entropy

The Math of Password Hashing Algorithms And Entropy

Long passwords and one-way password hashing are standard strategies used to increase security and protect your user's passwords. Let's take a look at how they work and some new ideas to improve it.

Why Adaptive MFA is a Game Changer for User Experience

Why Adaptive MFA is a Game Changer for User Experience

Users find traditional multi-factor authentication to be a burden. In this article, we examine how adaptive MFA can help improve the user experience (UX) rather than hinder it.