Authorization vulnerabilities are the most common critical finding in our API penetration tests. We find them on nearly every ...
According to a report released by Akamai earlier this year, API calls now represent 83% of all web traffic. Web-enabled applications already have 40% of their attack surface in the form of APIs ...
Tokens are an identity's crown jewel for digital authentication and authorization. Whether they are human or machine, and instantiated as API tokens, OAuth credentials, session tokens, or ephemeral ...
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...
As a leading mobile authentication service provider, Diversinet provides its customers with cost effective, mobile-optimized strong authentication products and services that reduce identity theft and ...
Security breaches are on the up – we all know that – and they are set to get worse. In order to interact with suppliers online, organizations will be expected to have stronger authentication, which is ...
Le Brun asks: "Technology has moved on, so isn’t it about time to kill off the hardware token?" The cost of 2FA First, let’s cover the basics. Two-factor authentication (2FA) is where a user’s ...