Avatar 🔐

Brennenstuhl on Security

Exploring usable security & website authentication with a foible for data breaches, account security and pass{keys, codes, words}.

  1. Home
  2. About me
  3. Knowledge Base
  4. Search
  5. Archives
  6. Disclaimer
    1. Dark Mode

Categories

Identity & Access Management Software Engineering Application Security Ethical Hacking Software Security

Tags

JWT OSS Password Security OIDC OAuth 2.0 SRE Usable Security AWS Defensive Security EuroStack
Featured image of post Honeytoken: Authentication Attack Breach Detection
Software Security

Honeytoken: Authentication Attack Breach Detection

Discover the power of Honeytoken in credential breach detection, and learn how they bolster defenses against authentication attacks from cybercriminals by improving threat detection.

29. Apr 2023
9 minute read
Featured image of post How to Design a Strong & Usable Password Policy
Identity & Access Management

How to Design a Strong & Usable Password Policy

In this article, I’ll explore the key components of a strong password policy based on state-of-the-art research and provide practical tips for striking a balance between security and usability.

26. Apr 2023
10 minute read
Featured image of post How to: Password-Manager Friendly Login Forms
Identity & Access Management

How to: Password-Manager Friendly Login Forms

In this article, I explore the importance of creating password-manager friendly login forms for a seamless user experience and enhanced web security.

23. Apr 2023
6 minute read
Featured image of post Learning AssertJ: Null ain't Blank
Software Engineering

Learning AssertJ: Null ain't Blank

This AssertJ bug could lead to severe issues: In Java, a blank String is a CharSequence that is empty, null or whitespace only – except when you use AssertJ!

05. Sep 2017
2 minute read
Featured image of post The Purpose of JWT: Stateless Authentication
Identity & Access Management

The Purpose of JWT: Stateless Authentication

JSON Web Token (JWT) allow you to establish stateless authentication. I explain why this is important and what's the fundamental difference to stateful authentication.

28. Apr 2017
8 minute read
1 … 3 4 5 6
Brennenstuhl on Security
Made and hosted in the EU 🇪🇺 · Powered by Hugo & Stack
Imprint · Privacy