This article highlights some common OAuth vulnerabilities found in web and mobile apps in 2021, along with some mitigations to improve security.| Nordic APIs
Although APIs have numerous advantages, they can bring several security threats to businesses. Let’s look at how you can identify and mitigate these API security risks.| Nordic APIs
Serverless computing aids digitalization. But what are the security implications? Here are top serverless threats and ways to respond:| Nordic APIs
How do we design and implement an OAuth flow for Single Page Applications (SPAs), a design style that has no backend? Learn the Assisted Token flow.| Nordic APIs
Two-factor authentication verifies user identity. We review 8 two-factor authentication APIs that enable authentication by text, email, phone, & other ways.| Nordic APIs
Multi-factor authentication is an authentication method that relies on more than one factor when determining whether to grant access to a user.| curity.io
Authenticating with an API has long been the holy grail for mobile and web developers. Jacob Ideskog describes how a Hypermedia API can implement user authentication.| Nordic APIs
Input-constrained browserless environments require a special OAuth recipe. In this article we describe authorization for an example living room streaming app, advocating for the new OAuth Device Flow for ultimate API security.| Nordic APIs
Learn about the importance of FIDO2 and biometric authentication in enhancing security and user experiences for mobile and handheld devices.| Nordic APIs
Nowadays, with cloud resources and remote employees, the perimeter doesn’t really exist anymore. This is where Zero-Trust Architecture comes into play.| Nordic APIs