InfoQ Homepage Authentication Content on InfoQ
Articles
RSS Feed-
Diving into Zero Trust Security
The Zero Trust approach involves a combination of more-secure authentication approaches, such as MFA with profiling and posturing of the client device, along with some stronger encryption checks. This article shares some insights on Zero Trust Security for your organization and your customers, and how you can get started with it.
-
Bootstrapping the Authentication Layer and Server with Auth0.js and Hasura
When you're trying to prototype an MVP for your app and want to start iterating quickly, the upfront cost of setting up authentication can be a massive roadblock. The authentication layer requires significant work, and you must always be on the lookout for security vulnerabilities.
-
The Future of Authentication
In this IEEE roundtable discussion hosted by guest editors Richard Chow, Markus Jakobsson, and Jesus Molina, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication.
Sponsored Content
O’Reilly Book: Identity-Native Infrastructure Access Management
[Early Release] Preventing breaches by eliminating secrets and adopting Zero Trust. Get a peek inside the first chapters. Download now.
Cookie for a Thought - How to Manage HTTP Sessions
This blog post covers the best practices to deal with HTTP sessions. Learn more.
How Passwordless Works
Passwordless is an example of how great security doesn't have to compromise usability, but instead improves it. Learn More.
Ghosts of Past Employees
Why access control has more in common with Halloween than you think. Find out now.