All

Stytch’s guide to adding passwordless options for password-based auth flows

Adding passwordless options to your password-based auth flow is a quick, seamless way to boost security and user engagement. At Stytch, we’re passionate about the power of frictionless, passwordless authentication, and we believe it’s the way of the future. But we also realize that each application and user base is unique, and not everyone is …

Stytch’s guide to adding passwordless options for password-based auth flows Read More »

Improve user authentication to prevent account takeover and fraud

Poor user experiences directly contribute to most online fraud each year. 82% of all successful data breaches can be traced back to the human element involved in online security — specifically, weak and inadequate passwords remain the largest source of account takeover risk. But users aren’t to blame for weak passwords — the user experience …

Improve user authentication to prevent account takeover and fraud Read More »

What is password salting?

Passwords remain the most common method of user authentication. Yet, they’re not the most secure. One solution to certain security concerns with password authentication involves hashing, a form of one-way encryption that transforms one string of characters in a password into a completely different string using a mathematical hashing function.  To improve the safety of …

What is password salting? Read More »

A founder’s guide to raising your seed round

I’m often asked by other founders about Stytch’s seed fundraising experience and what advice I’d give to other early-stage founders navigating the process today. While the overall fundraising environment has shifted in recent months, I think my advice for approaching a seed fundraise still fundamentally applies in the current market. I wanted to take a …

A founder’s guide to raising your seed round Read More »

How the API economy can radically transform your business

On June 22nd, 2022 Stytch co-founder Julianna Lamb presented on the API economy at Collision, one of North America’s largest tech conferences. Her presentation inspired this article — watch it here. Stytch is an API-first company. That means we build and perfect turnkey, easy-to-integrate authentication solutions — so you don’t have to. But we’re just …

How the API economy can radically transform your business Read More »

Stytch vs. Amazon Cognito

As a GTM lead at Stytch, I see many customers migrating to our platform from AWS Amazon Cognito — and many more potential customers thinking about making the switch. It’s not hard to see why. Much like Stytch, Amazon Cognito provides authentication, authorization, and user management solutions for web and mobile applications. But unlike Stytch, …

Stytch vs. Amazon Cognito Read More »

Ticketing platform Boletomóvil turns to Stytch for fast, frictionless auth with international support

Co-founders Roberto Rey and Walter González Domenzain started Boletomóvil for a simple reason: they love sports, but buying tickets for a game in Mexico — even through an online system like Ticketmaster — involved a multi-step process that made users jump between digital and physical points of sale. They decided Mexico needed an easy, fully …

Ticketing platform Boletomóvil turns to Stytch for fast, frictionless auth with international support Read More »

What is password hashing?

Building a product that requires passwords for user authentication means that you need to implement a method to verify your users’ passwords. However, storing plaintext passwords in your database comes with significant security risks.  Holding this data opens your app up to risk if your database gets breached. Hackers — who can be rogue employees …

What is password hashing? Read More »

Protect against password spraying

Despite its many benefits, digital transformation introduces numerous security challenges. Sensitive data stored in the cloud is especially susceptible to attacks. Cybercriminals use several approaches to gain unauthorized access to such data. Password spraying is one of the most effective, threatening approaches. While sometimes confused with credential stuffing, password spraying represents a different attack vector …

Protect against password spraying Read More »