ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Curity AB

  • Building Zero Trust Architecture with Tokens

    In this brief white paper, learn how your organization can get started with a ZTA including MFA and SSO approaches to strengthen security.

  • Financial Grade APIs Using OAuth and OpenID Connect

    OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.

  • The API Security Maturity Model

    API security has become a forefront issue for modern enterprises. Many API security implementations exist, but not all are effective. How can you ensure that your APIs are mature and secure? Download The API Security Maturity Model, which reframes the degrees of web service development maturity through a security lens.

  • API Security Checklist

    As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.

  • OAuth and OpenID Connect - What's Next?

    The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.

  • The Neo-Security Architecture

    The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.