Webinars, eBooks and checklists
Explore expert-led webinars, eBooks, and other resources on access control, security, and software architecture
Filter by
Filter by

The IAM security checklist for 2026

CISO’s guide to layered security that holds up under pressure
A guide to multitenant authorization

Securing agentic AI in fintech: attack surfaces, abuse cases, guardrails
Zero Trust for AI: Securing MCP servers
Fine-grained authorization for non-human identities
Adding fine-grained authorization to MCP servers

Programmatic policy management for complex systems
Scaling authorization logic in a multi-tenant application
How to adopt externalized authorization
Securing AI agents and non-human identities in enterprises

Mastering authorization in Fintech

Choosing the right AuthN and AuthZ deployment

Monolith to microservices migration: 10 critical challenges to consider

Building a scalable authorization system: a step-by-step blueprint

4G Capital’s Cloud transformation journey

Feature flags & authorization: Key tools for modern development

Simplify access controls in Node.js, React & serverless apps

Business case for externalized authorization