All posts/ #security
Why Zero Trust is Important
Given the ever-growing prevalence of remote jobs, bring your own device (BYOD), as well as SaaS and cloud-based assets, the importance of secure and trustworthy authentication processes has significantly increased. This article explains the functionality of Zero Trust and its benefits over older security perimeters.
• 4 minChildren and Online Security: Protecting the Most Vulnerable
Given a child's natural innocence, they might not expect an ill-wisher on their favourite online platform. This article discusses the new digital threats kids are subjected to and what adults can do to keep them safe.
• 8 minMagic Links – Are they Actually Outdated?
Are magic links are still viable as an authentication method or are you better off using newer passwordless alternatives?
• 6 minThe Ultimate Guide to Choosing the Right Data Residency
This article explains the role of data residency and centers in greater detail and list the factors you might want to consider when choosing a center region.
• 6 minSocial Logins: The Unexpected Drivers of Business Growth
Besides their obvious advantage of increased login convenience, social logins were also proven superior in enhancing business growth. To explain this correlation, it is essential to know how social logins work and how they benefit end-users and companies alike.
• 5 minIMO - DNSSEC
As the release of ZITADEL v2 comes closer, I was working on getting the DNSSEC setups ready for our new domains and I did wonder how the DNSSEC adoption turns out today?
• 3 minWhy You should Switch to Passwordless Authentication
To grant an insight into the newly found popularity of passwordless, this article will explain its concept, describe its reason for existence and elaborate upon its advantages over regular passwords.
• 5 minSmishing - How to Recognize Dangerous Text Messages
What if a text message you received is not what it seems? This article discusses the phenomenon of smishing and how to protect yourself from falling victim to it.
• 5 minThe Truth About Building Your Own Authentication Server
Despite a large supply of purchasable solutions, some firms choose to build their own authentication server. While this solution might work for some, there are various potentially unknown drawbacks that you should consider before settling for this method.
• 4 minA serverless future
With the rise of serverless and our need to scale, we wanted to explore the possibilities and values that modern serverless platform provides.
• 3 minSAML vs OIDC: Which Protocol is Best for Your Organization?
To help you determine which protocol is best suited for your use case, this article carefully explains the similarities and key differences between the two standards and what they each have to offer.
• 6 minNew Personal Access Tokens (PAT): A game changer for Service Users
In this article, we will explain why we have chosen to introduce PAT in addition to JWT, which audience this change will benefit and how PAT can be implemented into the ZITADEL console.
• 4 min