Edutech

Identity is the Perimeter

The idea of identity as the new perimeter for cybersecurity has been part of the conversation for a couple of years. The truth is that identity has always been a perimeter. Historically, cybersecurity experts did not apply multiple security controls…

How Companies are Using IAM Catalyst for Digital Transformation

It’s hard to find a company that isn’t investing in digital transformation in 2020. Particularly in the face of the COVID-19 pandemic, which has forced us all to adapt the way we work and interact, digital transformation is here to…

Fixing Broken Authentication

Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially…

Credential Stuffing Attacks

Compromised user credentials are a common attack vector, and can lead to sustained, costly attacks. As an Identity-as-a-service provider (IDaaS), Auth0 sees a large number of attacks targeting user credentials across our customer base. Some of our customers are under…

Build-vs-Buy evaluating identity management

Identity and Access Management (IAM), or simply identity management, refers to a service or platform that identifies individuals and controls their access to system resources through user rights and restrictions. Identity management is important for security and increases the productivity…