Latest

What is OAuth 2.0?

OAuth (which stands for open authorization) refers to a set of protocols that allow web...

Latest

All about auth

March 23, 2023

Floating light blue icons for different biometric methods on a dark blue backdrop: a microphone for voice, an eye for retinal / iris, a face for facial recognition, and a thumbprint.

Latest

All about auth

March 21, 2023

How do voice recognition biometrics work?

Latest

For engineers

March 17, 2023

Stytch postmortem 2023-02-23

An image of user / people icons that grow in number as you scan from left to right

Latest

All about auth

March 16, 2023

Foundations of scalable B2B auth

A photo of security expert Jordan. Burris on a dark green background, with the text "Stytch Talks with Jordan Burris" in light green

Latest

All about auth

March 15, 2023

Stytch Talks With Jordan Burris: “The Future of Multi-Factor Authentication (MFA)”

crossmintStytch

Latest

Company news

How to guides

March 9, 2023

Onboarding the next Web3 wave with Crossmint + Stytch

Latest

All about auth

March 1, 2023

Argon2 vs bcrypt vs. scrypt: which hashing algorithm is right for you?

A diagram of a passkey surrounded by similar technology – biometrics, a yubikey, etc.

Latest

All about auth

February 23, 2023

What is a passkey?

A thumbprint on a welcome screen, symbolizing biometric authentication

Latest

All about auth

February 15, 2023

All about biometric authentication

A series of locks finally unlock in the final frame – a metaphor for the power of passwordless authentication

Latest

All about auth

February 13, 2023

What is passwordless authentication?

An image of a phone entering a one-time passcode

Latest

All about auth

February 10, 2023

What are one-time passcodes (OTPs)?

Tiled pattern on purple background of alternating icons representing bots and humans

Latest

All about auth

February 6, 2023

Bot mitigation for identity and access management

FIDO logo surrounded by icons for biometrics, passkeys, and yubico yubikeys

Latest

All about auth

February 2, 2023

The FIDO alliance and a passwordless future

Two authentication methods on a green background: a one-time passcode and a time-based one-time-passcode

Latest

All about auth

February 1, 2023

TOTP vs SMS: Which one is better for two-factor authentication (2FA)?

Latest

All about auth

January 31, 2023

Balancing security and adoption: Preventing account takeover fraud with multi-factor authentication

Latest

Behind the scenes

January 23, 2023

Stytch Talks with Jaren Glover: Building high-powered engineering teams

Blue and green collage with a magnifying glass, padlock, and the words "Log in with SSO"

Latest

All about auth

January 20, 2023

Choosing a B2B auth provider

Latest

Company news

January 11, 2023

Stytch honored with BuiltIn's 2023 Best Places to Work award

Latest

All about auth

January 10, 2023

What is Security Assertion Markup Language (SAML) and how does it work?

Latest

All about auth

December 16, 2022

Securing AI against bot attacks

Latest

All about auth

December 16, 2022

What is device fingerprinting, and how does it work?

Latest

All about auth

December 16, 2022

What is OpenID Connect (OIDC)?

Latest

Company news

December 9, 2022

Stytch + Cerbos + FastAPI: Flexible authentication meets decoupled role and access management

Latest

All about auth

December 8, 2022

SSO protocols: SAML vs. OIDC

Latest

Behind the scenes

December 6, 2022

Designing Passwords in the Stytch SDKs

Latest

All about auth

November 22, 2022

What is single sign on, and how does it work?

Latest

All about auth

November 17, 2022

Organization tenancy: the foundation of SSO and B2B data models

Latest

All about auth

November 4, 2022

Introducing B2B Auth School

Latest

Company news

May 11, 2022

Introducing Vessel, powered by Stytch

Latest

People + culture

May 10, 2022

It's a Stytchiversary with Cass Roulund!

Latest

All about auth

May 4, 2022

Web3 and the future of data portability: rethinking user experiences and incentives on the internet

Latest

May 3, 2022

FinanceNow demo app - powered by Argyle, Unit, and Stytch

Latest

People + culture

April 22, 2022

Save time, save the planet–go passwordless!

Latest

People + culture

April 19, 2022

It's a Stytchiversary with Jeremy Kaplan!

Latest

Company news

April 13, 2022

Introducing Log in with Solana

Latest

Company news

April 11, 2022

Stytch’s new Javascript SDK

Latest

People + culture

April 1, 2022

Log in with username

Latest

March 30, 2022

Build a custom client portal on Airtable using Sequin, Stytch and Next.js

Latest

Company news

March 23, 2022

Introducing Log in with Ethereum

Latest

Behind the scenes

March 21, 2022

Making research an integral part of your product strategy

Latest

All about auth

March 18, 2022

5 reasons to choose Stytch over Auth0 

Latest

All about auth

March 16, 2022

What is WebAuthn?

Latest

All about auth

March 11, 2022

Password reuse is a cybersecurity threat

Latest

All about auth

February 24, 2022

Build vs. buy: what to consider when setting up an auth flow

Latest

Behind the scenes

February 17, 2022

5 Lessons for founding designers: what I’ve learned in my first year at Stytch

Latest

People + culture

February 16, 2022

Spotlight on Dennis Huang

Latest

Company news

People + culture

February 7, 2022

We've moved!

Latest

People + culture

January 31, 2022

Derek St. Onge

Latest

All about auth

January 28, 2022

What is the purpose of a refresh token?

Latest

All about auth

January 25, 2022

What is an API? What is an SDK? (And What’s the Difference?)

Authenticator app time-based passcodes

Latest

Company news

January 24, 2022

Introducing TOTP Authentication for Next-Level Security

Latest

All about auth

January 18, 2022

10 common cyber attacks

Latest

People + culture

January 11, 2022

Bingrui Tang

Latest

All about auth

January 10, 2022

What is MFA (Multi-Factor Authentication) and how does it work?

Latest

January 6, 2022

Managing your users at Stytch

Latest

All about auth

January 5, 2022

What is credential stuffing? How to prevent credential stuffing attacks

Latest

All about auth

December 17, 2021

An introduction to WebAuthn

Latest

Company news

December 8, 2021

Improving conversion with Google One Tap 

authentication vs authorization

Latest

All about auth

November 30, 2021

Authentication vs. Authorization: What You Need to Know

Stytch Series B Announcement

Latest

Company news

November 18, 2021

Announcing Stytch's $90M Series B at a $1B Valuation

Latest

All about auth

November 11, 2021

A guide to passwordless authentication solutions by business vertical

Latest

November 9, 2021

Building an app with Stytch and PlanetScale

Latest

People + culture

September 7, 2021

Nathan Chiu

Latest

People + culture

September 1, 2021

Danny Thomson

Latest

People + culture

September 1, 2021

Mary Gruen

Latest

People + culture

August 24, 2021

Grace Baelen-King

Latest

August 12, 2021

The Story(book) Behind Showcasing our SDKs Flexibility

Latest

All about auth

July 30, 2021

How just-in-time authentication boosts security and conversion

Latest

Behind the scenes

July 22, 2021

A founder's guide to hiring engineers

Latest

All about auth

July 19, 2021

Forget the password reset flow as you know it

Latest

Company news

July 14, 2021

Announcing our $30 Million Series A to make passwords a thing of the past

Latest

All about auth

July 12, 2021

Building the future of authentication

Get started with Stytch

Sign up or talk to an auth expert to learn how you can improve conversion, retention, and security with Stytch.