Homegrown security scales and works, if you have a full time dedicated team

Published by Emre Baran & Charith Ellawala on
Homegrown security scales and works, if you have a full time dedicated team
Every software company has to make build-or-buy decisions for every part of their stack. Unless it is your core business, you don’t build a globally-distributed network of data centres: you use a Cloud provider like AWS, GCP or Azure. You don’t build authentication systems from scratch: you use a... Read More

3 Most Common Authorization Designs for SaaS Products

Published by Cameron Pavey on
3 Most Common Authorization Designs for SaaS Products
As with most things when it comes to software engineering, there are many ways to design and implement an authorization system. Authorization systems add a level of security and validation to your application, allowing you to restrict access to resources to make sure that only the users who are m... Read More

Comparing User Permissions Strategies

Published by Tyler Charboneau on
Comparing User Permissions Strategies
Microservices architectures are the dominant force in today’s software engineering realm. This infrastructure approach—despite its multiple benefits—has created quite a tangled management web. IBM has corroborated this, sharing that applica... Read More
We use cookies and other forms of website navigational information to offer you a better browsing experience, analyze site traffic, personalize content, and serve targeted ads.

Read about how we use cookies in our Privacy Policy. If you continue to use this site, you consent to our use of cookies.