A Platform-Agnostic Approach in Cloud Security for Data Engineers Post date January 3, 2025 Post author By Nate Post categories In cloud-infrastructure, cloud-security, data-encryption, data-engineer, data-privacy, data-protection, data-storage, identity-management
OIDC in the Cloud: Using OAuth/OIDC in AWS and Azure Post date October 25, 2024 Post author By Gilad David Maayan Post categories In identity-management, identity-verification, oauth2, oidc, oidc-in-aws, oidc-in-cloud-environments, openid, openid-connect
TSA and DHS Want Your Selfie: The Move Toward Biometric IDs for Travel Post date September 28, 2024 Post author By The Sociable Post categories In biometric-verification, digital-identity, hackernoon-top-story, id-systems, identity-management, identity-verification, remote-id-validation-tech, selfies-as-id
Flutter — Secure your App with Microsoft’s Identity Platform (AAD & APIM) Post date February 1, 2023 Post author By simbu Post categories In api, flutter, identity-management, microsoft, oauth2
What I learned building a cloud-native frontend app for Asgardeo Post date February 5, 2022 Post author By Theviyanthan Krishnamohan Post categories In asgardeo, cloud-native-apps, front-end-development, identity-management, react
5 Common Identity and Access Management Security Risks Post date November 4, 2021 Post author By Jessica Truong Post categories In access-management, blogging-fellowship, cybersecurity, data-safety, data-security, iam, identity-and-access-management, identity-management
Secure Your Business With Identity and Access Management Post date August 25, 2021 Post author By CodeIT Post categories In access-management, cybersecurity, data-safety, good-company, iam, identity-and-access-management, identity-management, identity-management-solutions
The Next TCP/IP Moment in Identity Post date August 20, 2021 Post author By Hacker Noon Post categories In business, business-strategy, developers, digital-identity, identity-and-access-management, identity-management, jeff-lawson, software-development
Programming a Keylogger in Python Post date June 10, 2021 Post author By Morpheuslord Post categories In cyber-threats, cybersecurity, data-breach, ethical-hacking, hacking, identity-management, identity-verification, keylogger, web-monetization
How to Solve the Authentication Problem with WebAuthn+ Post date June 7, 2021 Post author By Michael Post categories In 2fa, authentication, blockchain, digital-identity, fido2, identity, identity-management, security
Consumer Identity Management is an important security tool for an IoT ecosystem Post date May 31, 2021 Post author By Deepak Gupta Post categories In access-control, consumer-data, data-privacy, identity-management, IoT, iot-security, password-security, vulnerability-management
Formjacking Attacks: Defention and How To Prevent It Post date February 2, 2021 Post author By Lauranutt Post categories In cyber-threats, cybersecurity, cybersecurity-awareness, data-breach, data-protection, data-security, formjacking, identity-management