This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: SFaIxaX3PJLuBc_tG-urTOaCbTfu1EQq4EwiE6v0fcc
Cover

Getting Authentication Correct

Written by @skiph | Published on 2020/1/23

TL;DR
For zero trust mobile apps and APIs, credentials aren’t nearly enough for zero trust. By late 2016, mobile internet usage surpassed desktop usage. At the same time, the last five years have witnessed a surge in API traffic across the internet. In 2014, Akamai reported that 47% of traffic through their secure CDN was API packets, while in 2018, those API packets had grown to 83% of the secure traffic. OWASP has published the OWasP Top 10 in 2019: Broken object level authorization (API1), Excessive data exposure (API4), Lack of resources and rate limiting)

[story continues]


Written by
@skiph
Developer and Advocate — Software Performance and API Security

Topics and
tags
@authentication|security|api|mobile-app-development|web-development|oauth2|cybersecurity|mobile-application-development
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: SFaIxaX3PJLuBc_tG-urTOaCbTfu1EQq4EwiE6v0fcc