February 9, 2016
View all 2 Followers
View all 1362 Related Articles
Related Articles (1362)
Over the years, ProgrammableWeb has tracked the various ways that API providers have used to authenticate their APIs in an effort to make API communications more secure. In our data model, we refer to these methods as Authentication Models. This article looks at the most popular methods used.
A cornerstone feature of any Web application is the login page. This article take you step by step through the process of adding phone number powered second factor authentication (2FA) to a Web application by taking advantage of Nexmo's Verify API. This tutorial requires knowledge of PHP.
Threatpost writer Lindsey O’Donnell interviewed Akamai security researcher Steve Regan about what Akamai is discovering during their research into creative cyber attacks, diving into how criminals are keeping up with and course-correcting for the newest layered security developments.