Articles by topic cybersecurity
- Mar 2, 2023By Aleksandr Klizhentas, Sakshyam ShahReviewing how Teleport extends BeyondCorp and federal zero trust architecture (ZTA).
- Sep 8, 2022By Sakshyam ShahExploring techniques and best practices to manage HTTP sessions.
- Apr 25, 2022By Virag ModyOAuth provides third party applications limited access to user resources without compromising the user's data. Find out exactly how in this blog.
- Mar 11, 2022By Ben ArentA deep dive into the UX of current single sign-on and an overview of possible solutions.
- Oct 28, 2021By Ben ArentAre you sure you've revoked all the credentials for the summer intern? This is a fun seasonal deep-dive into what we can learn from Halloween ceremonies.
Additional articles
- Jul 12, 2021By Shuo YangWhen talking about application authorizations, we often encounter two concepts RBAC (role-based access control) and ABAC (attribute-based access control).
- Jun 30, 2021By Sakshyam ShahMySQL brands itself as the world's most popular open source database. It has a corpus of tools and tutorials to automate MySQL, SQL injection and a notorious list of past vulnerabilities; as popular as MySQL database is among developers and SQL enthusiasts, it is equally popular among hackers.
- Jun 23, 2021By Shuo YangIn this post, we briefly talk about accessing AWS resources using Cognito Identity Pool and how you use it combination with AWS STS (Security Token Service) to provide temporary credentials.
- Jun 16, 2021By Shuo YangIn this post, we briefly talk about leveraging the right type of AWS IAM policy mechanisms to build the responsibility separation between the “central” team and the individual “development” team.