Archive
Archive
2020
- November 16, 2020 - How to pick the best auth solution
 - November 8, 2020 - Validating JWTs in Web APIs
 - July 12, 2020 - How to secure a multitenant application architecture
 - July 1, 2020 - Choosing the right error code 401, 403, or 404
 - June 9, 2020 - To authenticate or to authorize - what is the difference?
 - June 8, 2020 - Zoombombing - a case study of data protection
 - May 29, 2020 - So you want to build your own authorization?
 - May 27, 2020 - Why companies gamble on user data privacy
 - February 10, 2020 - Securely store client IDs and secret access keys
 
2021
2024
- November 19, 2024 - SaaS billing infrastructure and usage tracking
 - November 19, 2024 - Security or Convenience - Why Not Both?
 - September 4, 2024 - Ensuring the reliability of Authress
 - July 21, 2024 - Challenges building solutions for user sharable resources
 - July 2, 2024 - Why you should check your secrets into git
 - June 18, 2024 - How to estimate ROI on Security
 - June 14, 2024 - Build, buy, or use open source
 - May 10, 2024 - Building a Security-First API
 - March 8, 2024 - Adding Security to your Architecture
 - February 4, 2024 - Building a Security-First API
 
2025
- May 26, 2025 - What the @#!? is Auth
 - May 25, 2025 - API Gateway Authorizers: Vulnerable By Design (Be Careful!)
 - May 24, 2025 - OAuth Login should be standardized and this is why it cannot be
 - March 18, 2025 - Meeting Impossible SLAs: How we made our uptime 99.999%
 - March 13, 2025 - Unintended consequences of well-meaning changes
 - February 3, 2025 - Your source code is not that special
 - January 20, 2025 - Your security team’s job is not security
 - January 15, 2025 - Magic links and Passwordless login
 - January 15, 2025 - Are millions of accounts vulnerable due to Google's OAuth Flaw?
 - January 3, 2025 - Forget the checkboxes, make your security BLISS