Nowadays, with cloud resources and remote employees, the perimeter doesn’t really exist anymore. This is where Zero-Trust Architecture comes into play.| Nordic APIs
With the proper mindset, development approach, and internal API-first considerations, an internal API can be made highly effective and secure.| Nordic APIs
Jacob Ideskog is an Identity Specialist and CTO at Curity. Most of his time is spent working with security solutions in the API and Web space. He has worked with both designing and implementing OAuth and OpenID Connect solutions for large enterprise deployments as well as small startups.| Nordic APIs
What is a zero-trust architecture? Here we define zero-trust and look at how OAuth can enable a zero-trust architectural approach.| Nordic APIs
The Platform Summit is Nordic APIs’ flagship API conference and your chance to delve into everything related to APIs.| Nordic APIs