Is it safe to pass an OpenID Connect ID token to my back-end API for verification?

I am currently adding single sign-on functionality between my application and an electronic health record (EHR) system. The SSO is done using the OpenID Connect authorization code flow, but unlike a typical OIDC sign-in (i.e. signing in wi… Continue reading Is it safe to pass an OpenID Connect ID token to my back-end API for verification?

The Security Challenges of the Cloud

As more companies transition to the cloud, their sensitive corporate- and compliance-related data are no longer stored and used behind multiple layers of perimeter security. Instead, security teams are faced with multiple cloud services, each with its… Continue reading The Security Challenges of the Cloud

Making the Move to Multifactor Authentication

Over the last few years, multifactor authentication (MFA) has come a long way. In the past, MFA required that you carry a hard token on you at all times, but now, it has become a simple, one-touch endeavor. However, many still perceive MFA as a cumber… Continue reading Making the Move to Multifactor Authentication

Time to Tighten Up Cybersecurity to Fight Tax Fraud

We’ve described cyber criminals as opportunists many times. They’re adept at leveraging big events―from natural disasters to holidays―to their advantage. Like it or not, tax season is one such event that shows up on our calendar… Continue reading Time to Tighten Up Cybersecurity to Fight Tax Fraud

What Is Sign in with Apple’s Impact on Development?

 With more than 5 billion mobile phones on the market around the globe, mobile security is more important than ever. And the recent announcement from Apple around its Sign in with Apple guidelines brings privacy even more into the spotlight. It’s no d… Continue reading What Is Sign in with Apple’s Impact on Development?