Avatar 🔐

Brennenstuhl on Security

Exploring usable security & website authentication with a foible for data breaches, account security and pass{keys, codes, words}.

  1. Home
  2. About me
  3. Knowledge Base
  4. Search
  5. Archives
  6. Disclaimer
    1. Dark Mode

Categories

Identity & Access Management Software Engineering Ethical Hacking Software Security Application Security

Tags

JWT OSS Password Security OIDC OAuth 2.0 UX Security AWS Defensive Security Git Offensive Security
Featured image of post Unlocking the Secrets of Passwordless Authentication: Discover the Future of Cybersecurity
Identity & Access Management

Unlocking the Secrets of Passwordless Authentication: Discover the Future of Cybersecurity

Discover the world of passwordless authentication and how it's transforming cybersecurity. Learn about its benefits and types in this in-depth guide.

07. May 2023
10 minute read
Featured image of post Breaking Barriers: Empowering Your Login System with Long Password Support
Identity & Access Management

Breaking Barriers: Empowering Your Login System with Long Password Support

Maximize Login Security with Long Passwords and Secure Hashing. Learn How to Empower Your Login System with our Expert Guide. Read Now!

06. May 2023
13 minute read
Featured image of post Password Length Recommendation: The Ultimate Guide to Strong Passwords
Identity & Access Management

Password Length Recommendation: The Ultimate Guide to Strong Passwords

Dive into this comprehensive guide on Max Password Length Recommendation to ensure that your digital accounts and data remain safe from unauthorized access.

04. May 2023
8 minute read
Featured image of post Credential Breach Detection: Honeytoken as Defence Against Authentication Attacks
Software Security

Credential Breach Detection: Honeytoken as Defence Against Authentication Attacks

Threat Detection: Discover the power of Honeytoken in credential breach detection, and learn how they bolster defenses against authentication attacks.

29. Apr 2023
9 minute read
Featured image of post Striking the Perfect Balance: How to Design a Strong Password Policy That's User-Friendly & Effective
Identity & Access Management

Striking the Perfect Balance: How to Design a Strong Password Policy That's User-Friendly & Effective

Account Security ➢ Learn how to create a secure and user-friendly password policy that strikes the perfect balance between web security and user experience

26. Apr 2023
10 minute read
1 2 3 4 … 6
Brennenstuhl on Security
Made and hosted in the EU 🇪🇺 · Powered by Hugo & Stack
Imprint · Privacy