Julianna Lamb

How the API economy can radically transform your business

On June 22nd, 2022 Stytch co-founder Julianna Lamb presented on the API economy at Collision, one of North America’s largest tech conferences. Her presentation inspired this article — watch it here. Stytch is an API-first company. That means we build and perfect turnkey, easy-to-integrate authentication solutions — so you don’t have to. But we’re just …

How the API economy can radically transform your business Read More »

What is WebAuthn?

We’ve said it before and we’ll say it again, WebAuthn is one of the most exciting passwordless technologies available for both engineers and for users. In our latest post, we go a level deeper on WebAuthn to share what it is, why it’s so exciting, and what are considerations for implementing it.   WebAuthn, MFA, and …

What is WebAuthn? Read More »

All about biometrics

From fingerprints to faceprints, asking users to present biometric credentials is fast becoming a familiar authentication protocol. In this article, we’ll cover the basics of biometric authentication: what it is, how it works, and what to consider when implementing it. What is biometric authentication? Biometric authentication is a secure, low-friction way to confirm a user’s …

All about biometrics Read More »

Build vs. buy: what to consider when setting up an auth flow

Deciding whether to build new software and features in-house or buy an API or SDK solution from a third-party vendor is a question engineers face on a regular basis. When it comes to your authentication flow, that choice can have major implications for security—not to mention your user and developer experience and the resources you’ll …

Build vs. buy: what to consider when setting up an auth flow Read More »

How Does Single Sign-On Work?

In today’s digital-first world, good cybersecurity is more important than ever. With cyber attacks becoming more complex, creating secure apps and services is a crucial step in preventing them. For many reasons, the old standard of a password and username simply doesn’t cut it anymore. But requiring users to create complex password and username combinations for …

How Does Single Sign-On Work? Read More »

Refresh tokens: a refresher

When it comes to authorization, developers must carefully-balance security with user experience. On the one hand, if protocols are too stringent, a user can become frustrated. On the other, if authorization is too lax, a security breach is all but inevitable. Fortunately, there’s a solution that fulfills both needs—refresh tokens. In this post, we’ll explain …

Refresh tokens: a refresher Read More »

What is an API? What is an SDK? (And What’s the Difference?)

APIs and SDKs make it easier for developers to integrate different features and functionalities into their applications. Instead of development teams having to build all of their solutions in-house, APIs and SDKs enable them to connect to other apps and platforms and leverage existing services and technologies, providing them with the tools and resources they …

What is an API? What is an SDK? (And What’s the Difference?) Read More »

10 common cyber attacks

Cybersecurity can seem like a game of cat and mouse. No sooner do security experts get wise to the latest threats than attackers modify their tactics, discover fresh vulnerabilities, and develop new lines of offense. Still, most fall into a known set of categories. In this post, we review ten of the most common cyber …

10 common cyber attacks Read More »

What is MFA (Multi-Factor Authentication)?

MFA stands for multi-factor authentication. It’s a layered approach to confirming a user’s identity to ensure they have permission to access a protected website, application, network, or other digital system or perform a protected task within a digital system. As its name suggests, MFA requires users to successfully present two or more identity credentials, called …

What is MFA (Multi-Factor Authentication)? Read More »

What is SAML and how does it work?

The Security Assertion Markup Language—or SAML, for short—allows a user to be authenticated once, then have their credentials shared across different domains. In other words, someone can log in to one website to confirm their identity and access other web applications using the same credentials without having to log in again. This trusted, multi-domain standard …

What is SAML and how does it work? Read More »