All posts/ #security
How Does the Internet of Things Authentication Work?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 5 minUse ZITADEL as SSO provider for self-hosting
In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider
• 7 minSimplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 8 minWhat is an Identity Broker? - Everything you need to know
Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.
• 5 minYour Spellchecker Might Have Leaked Your Passwords
Whereas a seemingly innocent spellchecker might not raise any red flags, convenience and confidentiality are regrettably not always compatible online. This article explains the privacy shortcomings of Chrome’s Enhanced Spellcheck and Edge’s MS Editor and what you can do to keep your data safe.
• 4 minWhy Security Questions Are Useless And Unsafe
Discussing the shortcomings of security questions as a protection measure and what you can do to make them stronger.
• 7 minSecurity Threats of Public Wi-Fi - Is It Just Fearmongering?
Although public Wi-Fi networks certainly carry some frightening risks with a lot on the line, it is evident that such attacks aren't guaranteed occurrence. So how likely is it really that one will fall victim to a malicious network?
• 7 minWhy Zero Trust is Important
Given the ever-growing prevalence of remote jobs, bring your own device (BYOD), as well as SaaS and cloud-based assets, the importance of secure and trustworthy authentication processes has significantly increased. This article explains the functionality of Zero Trust and its benefits over older security perimeters.
• 4 minChildren and Online Security: Protecting the Most Vulnerable
Given a child's natural innocence, they might not expect an ill-wisher on their favourite online platform. This article discusses the new digital threats kids are subjected to and what adults can do to keep them safe.
• 8 minMagic Links – Are they Actually Outdated?
Are magic links are still viable as an authentication method or are you better off using newer passwordless alternatives?
• 6 minThe Ultimate Guide to Choosing the Right Data Residency
This article explains the role of data residency and centers in greater detail and list the factors you might want to consider when choosing a center region.
• 6 minSocial Logins: The Unexpected Drivers of Business Growth
Besides their obvious advantage of increased login convenience, social logins were also proven superior in enhancing business growth. To explain this correlation, it is essential to know how social logins work and how they benefit end-users and companies alike.
• 5 min