API Security

Featured image for Identity Management Day 2022: Are Your Digital Identities Secure?

Identity Management Day 2022: Are Your Digital Identities Secure?

Hosted by the Identity Defined Security Alliance and National Cybersecurity Alliance, Identity Management Day aims to provide education about the dangers of casually or improperly managing and securing digital identities, raising awareness and sharing best practices across the industry.   According to Gartner, APIs are expected to be the most frequent attack vector in 2022, and...
Read More
Featured image for The Perimeter has Disappeared: Why Zero Trust and IAM are Essential to Secure the Modern Enterprise

The Perimeter has Disappeared: Why Zero Trust and IAM are Essential to Secure the Modern Enterprise

In the conventional, on-premises IT infrastructure, organizations worked within the boundaries of their well-defined enterprise network perimeter. In this setting, on-premises security tools like virtual private networks (VPNs) were mostly sufficient to secure users and devices within the perimeter walls. However, with the increase in remote work and cloud computing, organizations are leveraging various apps...
Read More
Featured image for Identity and Authorization At Cloud Scale

Identity and Authorization At Cloud Scale

The future has a lot to answer for. For decades we’ve been promised super-cool inventions that we still haven’t received - flying cars, jetpacks and IAM platforms that provide security, scale and manageability- all with wrapped up with 21st century automation. George Jetson’s job had two settings ("Start" & "Stop") and the computer did the...
Read More
Featured image for 5 Reasons to Avoid Traditional IAM’s Bridge to Nowhere

5 Reasons to Avoid Traditional IAM’s Bridge to Nowhere

Even a global pandemic isn’t reducing the demand for digital transformation. As customers look for ways to engage with applications on their smart devices and workforces are increasingly “work from home”, the need for digital transformation has accelerated. Development teams eager to progress app modernization and transformation goals are looking for ways to accelerate the...
Read More
Featured image for What is OAuth 2.1?

What is OAuth 2.1?

Introduction The challenge with creating web standards and frameworks is that technology evolves so quickly that within a short amount of time your framework is already out of date. This is especially true for web-based application development, given how different the world looks today than it did in 2012 when the spec was first introduced....
Read More