0 Bearer Tokens for external tokens 4. Use a Secure Hash Algorithm to Sign Your Tokens When signing your tokens, use the strongest algorithm available in your infrastructure: SHA-256 or better. If y ...
Continue ReadingSeptember 16, 2021
tl;dr: Were proud to be the first company to win two API Security World awards, and were even prouder that it happened at our own event. Salt is a sponsor of this year's API Security World confer ...
Continue ReadingSeptember 16, 2021
They are not necessarily hard and fast rules, but rather observations that have helped me become more productive and efficient. I hope you find them helpful https://t.co/UQmge6poS9 ...
Continue ReadingSeptember 16, 2021
Salt Wins Best in API Security Award at API World Again! Its one thing for us at Salt to say were the best in API security its quite another for the team at API World to say it. And t ...
Continue ReadingSeptember 16, 2021
It enables enterprises to protect their APIs and web applications from the OWASP Top 10 API Threats. Cloudentity's mission is to help organizations build better software faster by automating security ...
Continue ReadingSeptember 16, 2021
It makes it easy to find and try out new apps, games, music, movies and TV shows from your Xbox One or Windows Store on your PC. And now you can also use Cortana voice commands to launch any app insta ...
Continue ReadingSeptember 16, 2021
You should not post confidential information to this blog site. All postings are subject to moderation and may be edited, removed or deleted by the moderator(s) at any time without notice. By posting ...
Continue ReadingSeptember 16, 2021
A blog article this week from the team at Auth0, explains how API tokens can be used as an alternative to OAuth2 for managing access control of APIs. The article provides a good overview of what API t ...
Continue ReadingSeptember 16, 2021
Back to Main