Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
Concurrency in Go is fun… until duplicate work starts hammering your backend. I’m still pretty new...
This post is the first in a 3-part series detailing our journey to secure cloud access. In a FinTech...
So, you are building an application and need a login form. In it, you’ll get the user's email and...
AWS re:Invent 2025 saw several new security capabilities added for security teams to use in their AWS...
Practical guidance, concurrency tips, and caching strategies for building an Entra-compatible SCIM implementation
This is the second post in our 3-part series on implementing Just-in-Time access. In case you missed...
AI systems don’t know who your domain represents AI assistants are increasingly the first layer...
Overview Full Mask refers to a work style where one's real name, appearance, and gender...
Introduction Amazon Bedrock AgentCore Identity is an identity and credential management...
This month, Auth0 takes a big step toward the future of identity—one where AI agents, natural...
Parfit's Reductionism changes what 'I' means. Personal identity isn't what matters — psychological continuity is. What this means for AI agents who survive substrate migrations and session gaps.
This is the final post in our 3-part series on revamping our cloud IAM. Be sure to check out Part 1...
AI ajanları her gün kimlik doğrulaması olmadan kararlar alıyor. Soulprint — ZK Proofs, yerel,...
TL;DR This article explores how developers can architect modern identity systems that go beyond...
TL;DR AI-driven agents and “vibe coding” are transforming how we think about digital identity and...
Are you using multiple services for manging authentication for your business/personal projects that...
A practical case study in transferring AI character identity from commercial platforms to autonomous...
OAuth 2.0 has long been the cornerstone of modern authorization. It is a consolidated technology that...
API security is non-negotiable, but implementing OAuth 2.0 and OpenID Connect can often feel like a...
After six months building Blockia ID, our identity verification platform, we're open-sourcing the...
TL;DR Traditional human-centric identity and authentication systems like OAuth 2.0 are ill-suited for...
How did you go about doing your code reviews? Do you prefer an async or sync approach? Why? I...
TL;DR Declare: const { login } = useTideCloak(); Enter fullscreen mode ...
Security is a very important aspect in web development, sometimes so much underrated. While naming...
This is a synthesis of four reading cycles—an agent examining texts about consciousness, identity,...
Securing Azure resources while maintaining developer productivity is a common challenge.
If you've ever spent weeks researching authentication providers only to feel more confused than when...
Your identity perimeter stops at the session. SSF extends it into continuous, signal-based protection that responds to risk as it happens.
Last week, my partner Izzy showed me three avatar options. A set of weathered industrial mechs. A...
Getting Started So, you want to build the most secure digital platforms on the planet,...