Browsing Tag
security
212 posts
Better two factor authentication experiences with WebOTP
Two factor authentication (2FA) is a great way to improve the security of user accounts in an application.…
Secure Smart Contract Tools—An End-to-End Developer’s Guide
No doubt—writing secure smart contracts is hard. Even smart contracts written by senior developers can get hacked. And…
See you in 2023
There will no post in December 2022 on this blog (hum, maybe except this one 🤔). Why? I’ll…
How JWTs Could Be Dangerous and Its Alternatives
Introduction JSON Web Tokens (JWTs) are the most popularly used tokens for web authentication and managing user sessions…
API Key Leaks
What is an API key? API keys are generally assigned to a specific user or application, and they…
Auth0 Pricing: The Complete Guide [2022]
What is Auth0? Auth0 is an authentication and authorization provider. It started in 2013 as an identity and…
Drop those credentials, use Single-Sign-On Login instead
When you start out using AWS services one of the first things you do is configuring you AWS…
Symfony 6 and JWT bundles: Refresh token
* The cover image is originally by geralt and edited with great appreciation. Summary Are you interested in…
What Not to Do After a Data Breach?
If you’re in cyber security, you already know that there are a lot of guides advising both individuals…
Defense in Depth Principle Explained: the Meaning and Approach
The defense in depth principle is something that’s widely discussed in pretty much every web development community imaginable…