vdelitz

vdelitz @vdelitz

About: Co-founder @ Corbado

Location:
Munich, Germany
Joined:
Mar 8, 2023

vdelitz
articles - 149 total

Building a Business Case for Passkey Adoption

Read the full article here Passkey authentication is quickly evolving from an emerging technology...

Learn More 1 0Jun 27

Visa Secure: Optimizing Cardholder Authentication

Read the full article here Introduction: What is Visa Secure? Visa Secure stands at...

Learn More 1 0Jun 23

PCI DSS 4.0 Authentication: How Passkeys Transform Payment Security

Read the full article here Introduction As payment threats increase in complexity,...

Learn More 0 0Jun 19

Mastercard Identity Check Explained: A Guide to Modern Online Payment Authentication

Read the full article here Understanding Mastercard Identity Check for Secure Digital...

Learn More 0 0Jun 18

Passkeys vs. Digital Credentials: What You Need to Know

Read the full article here Understanding Passkeys and Digital Credentials As digital...

Learn More 1 1Jun 17

Apple’s Passkey Account Creation API in iOS 26 Explained

Read the full article here Introduction: Apple’s Next Step in Passwordless...

Learn More 0 1Jun 12

How to Build a MERN Stack CRUD App: A Step-by-Step Guide

Read the full article here Introduction: Why MERN Is Ideal for Modern CRUD...

Learn More 0 1Jun 11

How to Build a Full-Stack React CRUD App with Node.js, Express and PostgreSQL: Step-by-Step Guide

Read the full article here Introduction: Full-Stack JavaScript Made Practical Building...

Learn More 2 2Jun 10

Build a Full Stack React CRUD App with Node.js, Express & MySQL: Step-by-Step Guide

Read the full article here Overview: Modern CRUD Application with React and...

Learn More 1 2Jun 4

PIPEDA Compliance and Data Security: A Practical Guide for Canadians

Read the full article here Understanding PIPEDA: The Foundation of Canadian Privacy...

Learn More 0 0Jun 2

What Australians Need to Know About the PGPA Act

Read full article here Introduction: The Importance of the PGPA Act for Australian...

Learn More 0 0May 27

Building a Secure Node.js REST API with JWT Auth and Role-Based Access Using MySQL

Read the full article here Introduction: Token-Based Authentication in Modern Node.js...

Learn More 1 0May 26

How to Implement TOTP Authentication in Next.js: Secure 2FA Login Step-by-Step

Read the full article here Introduction: Why Add TOTP to Your Next.js...

Learn More 0 0May 22

How to Implement Google OAuth Social Login in Next.js

Read the full article here Implementing Secure Google OAuth Social Login in...

Learn More 1 0May 20

CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

Read the full article here Understanding CPS 234: The Cybersecurity Standard CPS 234...

Learn More 0 0May 19

Medibank Data Breach 2022: Key Cybersecurity Lessons

Read the full article here Why the Medibank Data Breach Matters In October 2022,...

Learn More 0 0May 14

Cybersecurity Metrics & KPIs in 2025: The Key Indicators Every Business Should Track

Read the full article here Why Cybersecurity Metrics Matter in 2025 Modern cyber...

Learn More 0 2May 13

Lessons from the LastPass Data Breach: And How Passkeys Strengthen Cybersecurity

Read the full article here Understanding the LastPass Data Breach and Its Impact The...

Learn More 0 0May 12

Passkeys & Password Managers: Essential Guide for Relying Parties

Read the full article here Why Relying Parties Should Care About Passkey and Password...

Learn More 1 0May 9

Passkeys vs. Biometrics in Native Apps: Enhancing App Security and User Auth

Read the full article here Introduction: The Evolution of Secure App Login As reliance...

Learn More 0 0May 8

EMV 3DS ACS & Passkey Support for Secure Online Payments

Read the full article here Introduction to EMV 3DS and its Role in online Payments The...

Learn More 1 0May 7

Implementing OTP Auth in Next.js: A Step-by-Step Guide

Read the full guide here Introduction: Why use One-Time Passwords (OTPs) in...

Learn More 1 0May 1

Conditional UI for Passkeys: Simplifying WebAuthn Authentication with Passkey Autofill

What is Conditional UI and How Does It Improve Passkey Authentication? Passkeys and WebAuthn have...

Learn More 0 0Apr 28

Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

Read full article here Passkeys vs. Traditional 2FA: A Security Comparison Robust user...

Learn More 1 0Apr 25

Passkeys & Privacy: Is it really safe?

Privacy in Passkey Authentication: What You Really Need to Know Security and convenience...

Learn More 0 0Apr 23

Vietnam’s Biometric Verification Mandate: Key Regulatory Impact and Opportunities for Banks & Corporates

Read full article here Vietnam’s New Biometric Verification Rules: What Banks and...

Learn More 0 0Apr 17

Biometrics and Passkeys: Strengthening Banking Security in Nigeria

Read full article here Rising Cyber Threats and Authentication in Nigeria Nigeria’s...

Learn More 0 0Apr 16

Why the UK’s NCSC Advocates Passkeys Over Passwords for Better Cyber Security

Read the full article here. Passwords originated in the 1970s when the internet had a limited number...

Learn More 0 0Apr 16

Passkeys in Strategy Consulting: Why it matters

Read the full article here Passkeys in Consulting: Solving the Login Puzzle Consulting...

Learn More 0 0Apr 3

Rolling out passkeys to millions of users?

Learn how B2C dev teams handle UX, rollout & IAM in our webinar at April 16 (15:30 CET). Reserve...

Learn More 1 0Mar 27