Loading...
Menu
Judith is a Product Marketing Engineer, with a keen interest in security and identity. She started her working life as a developer and moved onto being a security engineer and consultant before joining the Curity team.
Where to Deploy Your Customer Identity and Access Management
Judith Kahrer
Decentralized Identifiers and Verifiable Credentials combined provide a promising new way of identity management.
In this article we straighten up some misconceptions and provide some basic understanding concerning Decentralized Identifiers (DIDs).
APIs are critical for modern solutions in most industries. This is why a zero-trust approach is required in API security.
This article offers advice on what to consider when starting your identity and access management (IAM) journey.
Why and when the EdDSA algorithm should be implemented to save you time, money, and resources.
Algorithms are essential to avoid security incidents such as private keys being retrieved from signatures or valid signatures being created.
JWT Secured Authorization Response Mode (JARM) allows you to use signed and encrypted responses. But why introduce another encryption if there is TLS?
How do you protect people's integrity in a pandemic when you rely on private data being shared and accessible?
Many specifications and drafts within the OAuth and OpenID world aim to help translate Open Banking requirements to technical ones.
Follow @curityio on Twitter
Subscribe for more content!