Archive
Archive
2020
- November 16, 2020 - How to pick the best auth solution
- November 8, 2020 - Validating JWTs in Web APIs
- July 12, 2020 - How to secure a multitenant application architecture
- July 1, 2020 - Choosing the right error code 401, 403, or 404
- June 9, 2020 - To authenticate or to authorize - what is the difference?
- June 8, 2020 - Zoombombing - a case study of data protection
- May 29, 2020 - So you want to build your own authorization?
- May 27, 2020 - Why companies gamble on user data privacy
- February 10, 2020 - Securely store client IDs and secret access keys
2021
2024
- November 19, 2024 - SaaS billing infrastructure and usage tracking
- November 19, 2024 - Security or Convenience - Why Not Both?
- October 27, 2024 - OAuth Login should be standardized and this is why it cannot be
- September 4, 2024 - Ensuring the reliability of Authress
- July 21, 2024 - Challenges building solutions for user sharable resources
- July 2, 2024 - Why you should check your secrets into git
- June 18, 2024 - How to estimate ROI on Security
- June 14, 2024 - Build, buy, or use open source
- May 10, 2024 - Building a Security-First API
- March 8, 2024 - Adding Security to your Architecture
- February 4, 2024 - Building a Security-First API