Quantcast
Channel: jacob ideskog Archives | Nordic APIs
Browsing all 15 articles
Browse latest View live

Secure Social Media Integration – video and slides

Travis Spencer and Jacob Ideskog from Twobo Technologies spoke at Nordic APIs in Stockholm about how to easily integrate social media services into applications using the Janrain API. Check out the...

View Article


How To Control User Identity Within Microservices

Everyone’s excited about microservices, but actual implementation is sparse. Perhaps the reason is that people are unclear on how these services talk to one another; especially tricky is properly...

View Article


Data Sharing in the IoT

We consistently put our personal data at risk. API security concerns sky rocket as the user’s desire to pass access to others steadily increases. With the rise of Internet of Things (IoT) devices, the...

View Article

Decouple User Identity from API Design to Build Scalable Microservices

How does one go about securing APIs, microservices, and websites? One way to do this is by focusing on the identity — knowing who the caller is, and what the caller is allowed to do with your data. Too...

View Article

How to Handle Batch Processing with OAuth 2.0

Recently on the Nordic APIs channel we’ve had a few people ask — how do you handle batch processes that are secured with OAuth 2.0? Batch requests are ones executed automatically or programmed to...

View Article


Using OAuth Device Flow For UI-Incapable Devices

As the internet grows and more devices become interconnected, authorization is becoming more and more complex. Early implementations of online services were easy to authorize against since they were...

View Article

Austin API Summit 2019 Wrap Up

In May 2019, Nordic APIs hosted the 2nd annual Austin API Summit. This year, we had two tracks with over 40 speakers presenting on advanced API platform strategies. Compared to last year, the Austin...

View Article

Top API Security Threats In 2020: Expert Panel Interview

When it comes to API security, no integration is 100% safe. Breaches meet the news day after day. Vulnerable connections continue to expose private data, costing companies millions of dollars in...

View Article


Insights From The 2019 Platform Summit

From October 22-23, Nordic APIs hosted our 5th annual Platform Summit in Stockholm, Sweden. #PS19 brought together over 450 total attendees and hosted 65 speakers across three stages. In the coming...

View Article


Introducing The API Security Maturity Model

When a user utilizes a service, that user must first attest they are who they say they are. In most use cases, they must then confirm they can do what they’re trying to do. For many users, this is a...

View Article

Secure Social Media Integration – video and slides

Travis Spencer and Jacob Ideskog from Twobo Technologies spoke at Nordic APIs in Stockholm about how to easily integrate social media services into applications using the Janrain API. Check out the...

View Article

Image may be NSFW.
Clik here to view.

How To Control User Identity Within Microservices

Everyone’s excited about microservices, but actual implementation is sparse. Perhaps the reason is that people are unclear on how these services talk to one another; especially tricky is properly...

View Article

Image may be NSFW.
Clik here to view.

Data Sharing in the IoT

We consistently put our personal data at risk. API security concerns sky rocket as the user’s desire to pass access to others steadily increases. With the rise of Internet of Things (IoT) devices, the...

View Article


Image may be NSFW.
Clik here to view.

Decouple User Identity from API Design to Build Scalable Microservices

How does one go about securing APIs, microservices, and websites? One way to do this is by focusing on the identity — knowing who the caller is, and what the caller is allowed to do with your data. Too...

View Article

Image may be NSFW.
Clik here to view.

How to Handle Batch Processing with OAuth 2.0

Recently on the Nordic APIs channel we’ve had a few people ask — how do you handle batch processes that are secured with OAuth 2.0? Batch requests are ones executed automatically or programmed to...

View Article

Browsing all 15 articles
Browse latest View live