The API Security Maturity Model is a new model to gauge how mature your API security system is. Spoiler alert: if you're not using Claims, you might not make it to the top.| Nordic APIs
We provide examples of the most common multi-factor authentication approaches to help you find the right balance between security and usability.| curity.io
Explore OAuth 2.0. What is it and how can you best implement it?| curity.io
In this piece, we’re going to look at OAuth, and give a brief rundown of each flow type. We’ll look at when each flow is appropriate, and what its specific use case is.| Nordic APIs
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.| curity.io
What does it take to secure bank-grade APIs? Learn why Travis Spencer of Curity is banking on OAuth and supporting tooling here:| Nordic APIs
Nowadays, with cloud resources and remote employees, the perimeter doesn’t really exist anymore. This is where Zero-Trust Architecture comes into play.| Nordic APIs