Use JWTs for internal tokens and OAuth2.

0 Bearer Tokens for external tokens 4. Use a Secure Hash Algorithm to Sign Your Tokens When signing your tokens, use the strongest algorithm available in your infrastructure: SHA-256 or better. If y ...

Continue Reading
We’re proud to be the first company to win two API Security World awards, and we’re even prouder that it happened at our own event.

tl;dr: We’re proud to be the first company to win two API Security World awards, and we’re even prouder that it happened at our own event. Salt is a sponsor of this year's API Security World confer ...

Continue Reading
The following is a list of all the things I’ve learned in my first year as an iOS developer.

They are not necessarily hard and fast rules, but rather observations that have helped me become more productive and efficient. I hope you find them helpful https://t.co/UQmge6poS9 ...

Continue Reading
Salt is the leader in API security, and we’re proud of it.

Salt Wins “Best in API Security” Award at API World – Again! It’s one thing for us at Salt to say we’re the best in API security – it’s quite another for the team at API World to say it. And t ...

Continue Reading
The Cloudentity Authorization Governance Automation Platform is a cloud-based solution that provides an automated, rules-driven approach to authorization governance.

It enables enterprises to protect their APIs and web applications from the OWASP Top 10 API Threats. Cloudentity's mission is to help organizations build better software faster by automating security ...

Continue Reading
I’m a big fan of the new “Discovery Mode” in Windows 10.

It makes it easy to find and try out new apps, games, music, movies and TV shows from your Xbox One or Windows Store on your PC. And now you can also use Cortana voice commands to launch any app insta ...

Continue Reading
This blog site is a public forum.

You should not post confidential information to this blog site. All postings are subject to moderation and may be edited, removed or deleted by the moderator(s) at any time without notice. By posting ...

Continue Reading
API tokens are a great way to manage access control for APIs.

A blog article this week from the team at Auth0, explains how API tokens can be used as an alternative to OAuth2 for managing access control of APIs. The article provides a good overview of what API t ...

Continue Reading

Back to Main

Subscribe for the latest news: