Secure Social Media Integration – video and slides
Travis Spencer and Jacob Ideskog from Twobo Technologies spoke at Nordic APIs in Stockholm about how to easily integrate social media services into applications using the Janrain API. Check out the...
View ArticleHow To Control User Identity Within Microservices
Everyone’s excited about microservices, but actual implementation is sparse. Perhaps the reason is that people are unclear on how these services talk to one another; especially tricky is properly...
View ArticleData Sharing in the IoT
We consistently put our personal data at risk. API security concerns sky rocket as the user’s desire to pass access to others steadily increases. With the rise of Internet of Things (IoT) devices, the...
View ArticleDecouple User Identity from API Design to Build Scalable Microservices
How does one go about securing APIs, microservices, and websites? One way to do this is by focusing on the identity — knowing who the caller is, and what the caller is allowed to do with your data. Too...
View ArticleHow to Handle Batch Processing with OAuth 2.0
Recently on the Nordic APIs channel we’ve had a few people ask — how do you handle batch processes that are secured with OAuth 2.0? Batch requests are ones executed automatically or programmed to...
View ArticleUsing OAuth Device Flow For UI-Incapable Devices
As the internet grows and more devices become interconnected, authorization is becoming more and more complex. Early implementations of online services were easy to authorize against since they were...
View ArticleAustin API Summit 2019 Wrap Up
In May 2019, Nordic APIs hosted the 2nd annual Austin API Summit. This year, we had two tracks with over 40 speakers presenting on advanced API platform strategies. Compared to last year, the Austin...
View ArticleTop API Security Threats In 2020: Expert Panel Interview
When it comes to API security, no integration is 100% safe. Breaches meet the news day after day. Vulnerable connections continue to expose private data, costing companies millions of dollars in...
View ArticleInsights From The 2019 Platform Summit
From October 22-23, Nordic APIs hosted our 5th annual Platform Summit in Stockholm, Sweden. #PS19 brought together over 450 total attendees and hosted 65 speakers across three stages. In the coming...
View ArticleIntroducing The API Security Maturity Model
When a user utilizes a service, that user must first attest they are who they say they are. In most use cases, they must then confirm they can do what they’re trying to do. For many users, this is a...
View ArticleSecure Social Media Integration – video and slides
Travis Spencer and Jacob Ideskog from Twobo Technologies spoke at Nordic APIs in Stockholm about how to easily integrate social media services into applications using the Janrain API. Check out the...
View ArticleHow To Control User Identity Within Microservices
Everyone’s excited about microservices, but actual implementation is sparse. Perhaps the reason is that people are unclear on how these services talk to one another; especially tricky is properly...
View ArticleData Sharing in the IoT
We consistently put our personal data at risk. API security concerns sky rocket as the user’s desire to pass access to others steadily increases. With the rise of Internet of Things (IoT) devices, the...
View ArticleDecouple User Identity from API Design to Build Scalable Microservices
How does one go about securing APIs, microservices, and websites? One way to do this is by focusing on the identity — knowing who the caller is, and what the caller is allowed to do with your data. Too...
View ArticleHow to Handle Batch Processing with OAuth 2.0
Recently on the Nordic APIs channel we’ve had a few people ask — how do you handle batch processes that are secured with OAuth 2.0? Batch requests are ones executed automatically or programmed to...
View Article