All posts/ #security
How Password Hashing and Salt Can Enhance Password Security
This article discusses the importance of password hashing and salting to secure password storage.
• 5 minSingle Sign-On (SSO) vs. Federated Identity Management (FIM) - The Key Differences
Numerous businesses have implemented solutions like federated identity management (FIM) and single sign-on (SSO) to enhance authentication process security while minimizing password fatigue. This article discusses the difference between these two approaches.
• 6 minComparing ZITADEL to Firebase
The purpose of this article is to guide readers on what are the differences between ZITADEL and Firebase
• 8 minWhy an Authentication Solution Is Crucial for GDPR Compliance
This article discusses the role of identity (IAM) vendors in becoming GDPR compliant and the responsibilities of data processors and controllers.
• 5 minSocial Engineering - How Hackers are Manipulating You
This article discusses the six most commonly encountered social engineering tactics and how to protect your account from cybercriminals.
• 6 minSecure Logins and Resource Access with ZITADEL and OpenID Connect - Part 2
This follow-up article shows how a Web Application and a Single Page Application can securely authenticate end-users and gain access to protected resources using ZITADEL and OIDC.
• 9 minSecure Logins and Resource Access with ZITADEL and OpenID Connect - Part 1
This article explains how applications can securely authenticate end users and control application access to protected resources using ZITADEL and OpenID Connect.
• 9 minHow Attackers Bypass Two-factor Authentication (2FA)
This article discusses five typical methods attackers use to bypass two-step verification or two-factor authentication and some precautions you may take to protect your account.
• 7 minHow to Manage Authorizations with Role-Based Access Control
In this article, you'll learn how RBAC works, what security use cases it enables, and how you can implement it to effectively authorize your users.
• 8 minBrowser Fingerprinting: What Is It and Why Is It Used?
Data stored in browsers can be used to identify site visitors and to track their activity. Browser Fingerprinting can reduce fraud and suspicious website traffic.
• 6 minThermal Attacks - How Heat From Fingertips Can Reveal Passwords
While you might be familiar with common hacking methods, such as phishing and malware, researchers have discovered a bizarre new alternative: Thermal Attacks.
• 6 minHow to handle silent-login in ZITADEL?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 3 min