Getting Authentication Correct

Written by skiph | Published 2020/01/23
Tech Story Tags: @authentication | security | api | mobile-app-development | web-development | oauth2 | cybersecurity | mobile-application-development

TLDR For zero trust mobile apps and APIs, credentials aren’t nearly enough for zero trust. By late 2016, mobile internet usage surpassed desktop usage. At the same time, the last five years have witnessed a surge in API traffic across the internet. In 2014, Akamai reported that 47% of traffic through their secure CDN was API packets, while in 2018, those API packets had grown to 83% of the secure traffic. OWASP has published the OWasP Top 10 in 2019: Broken object level authorization (API1), Excessive data exposure (API4), Lack of resources and rate limiting)via the TL;DR App

no story

Written by skiph | Developer and Advocate — Software Performance and API Security
Published by HackerNoon on 2020/01/23