All about auth

What is OAuth 2.0?

OAuth (which stands for open authorization) refers to a set of protocols that allow web...

Latest

All about auth

March 23, 2023

Floating light blue icons for different biometric methods on a dark blue backdrop: a microphone for voice, an eye for retinal / iris, a face for facial recognition, and a thumbprint.

Latest

All about auth

March 21, 2023

How do voice recognition biometrics work?

An image of user / people icons that grow in number as you scan from left to right

Latest

All about auth

March 16, 2023

Foundations of scalable B2B auth

A photo of security expert Jordan. Burris on a dark green background, with the text "Stytch Talks with Jordan Burris" in light green

Latest

All about auth

March 15, 2023

Stytch Talks With Jordan Burris: “The Future of Multi-Factor Authentication (MFA)”

Latest

All about auth

March 1, 2023

Argon2 vs bcrypt vs. scrypt: which hashing algorithm is right for you?

A diagram of a passkey surrounded by similar technology – biometrics, a yubikey, etc.

Latest

All about auth

February 23, 2023

What is a passkey?

A thumbprint on a welcome screen, symbolizing biometric authentication

Latest

All about auth

February 15, 2023

All about biometric authentication

A series of locks finally unlock in the final frame – a metaphor for the power of passwordless authentication

Latest

All about auth

February 13, 2023

What is passwordless authentication?

An image of a phone entering a one-time passcode

Latest

All about auth

February 10, 2023

What are one-time passcodes (OTPs)?

Tiled pattern on purple background of alternating icons representing bots and humans

Latest

All about auth

February 6, 2023

Bot mitigation for identity and access management

FIDO logo surrounded by icons for biometrics, passkeys, and yubico yubikeys

Latest

All about auth

February 2, 2023

The FIDO alliance and a passwordless future

Two authentication methods on a green background: a one-time passcode and a time-based one-time-passcode

Latest

All about auth

February 1, 2023

TOTP vs SMS: Which one is better for two-factor authentication (2FA)?

Latest

All about auth

January 31, 2023

Balancing security and adoption: Preventing account takeover fraud with multi-factor authentication

All about auth

January 23, 2023

JWTs vs. sessions: which authentication approach is right for you?

Blue and green collage with a magnifying glass, padlock, and the words "Log in with SSO"

Latest

All about auth

January 20, 2023

Choosing a B2B auth provider

Latest

All about auth

January 10, 2023

What is Security Assertion Markup Language (SAML) and how does it work?

Latest

All about auth

December 16, 2022

Securing AI against bot attacks

Latest

All about auth

December 16, 2022

What is device fingerprinting, and how does it work?

Latest

All about auth

December 16, 2022

What is OpenID Connect (OIDC)?

Latest

All about auth

December 8, 2022

SSO protocols: SAML vs. OIDC

Latest

All about auth

November 22, 2022

What is single sign on, and how does it work?

Latest

All about auth

November 17, 2022

Organization tenancy: the foundation of SSO and B2B data models

All about auth

November 17, 2022

What is CAPTCHA, and how does it work?

All about auth

November 4, 2022

Anatomy of a strong password

Latest

All about auth

November 4, 2022

Introducing B2B Auth School

All about auth

October 27, 2022

Do passkeys live up to the hype?

All about auth

October 24, 2022

What is unphishable MFA?

All about auth

October 13, 2022

The importance of investing in unphishable authentication

All about auth

September 29, 2022

Stytch Talks with Brian Hale: rethinking user sign-up and login to unlock growth

All about auth

September 16, 2022

What is identity and access management (IAM)?

All about auth

September 8, 2022

How compromised passwords lead to data breaches

what is totp

All about auth

September 1, 2022

What is TOTP and why does it matter?

All about auth

August 31, 2022

Making auth your growth lever

All about auth

August 30, 2022

The definitive guide to choosing a Customer and Identity Access Management (CIAM) solution

All about auth

August 25, 2022

Eliminate bot attacks from the CAPTCHA equation

All about auth

August 24, 2022

Multi-factor authentication: how to choose the right approach for your business

All about auth

August 23, 2022

Step-up versus multi-factor authentication (MFA)

All about auth

August 17, 2022

Stytch’s guide to adding passwordless options for password-based auth flows

All about auth

August 15, 2022

Improve user authentication to prevent account takeover and fraud

All about auth

August 11, 2022

What is password salting?

All about auth

August 4, 2022

How the API economy can radically transform your business

All about auth

July 28, 2022

Stytch vs. Amazon Cognito

All about auth

July 26, 2022

What is password hashing?

All about auth

July 18, 2022

Protect against password spraying

All about auth

July 13, 2022

How Apple’s passkeys just brought us one step closer to a passwordless internet

All about auth

June 2, 2022

4 Ways to use Stytch's Embeddable Magic Links

Latest

All about auth

May 4, 2022

Web3 and the future of data portability: rethinking user experiences and incentives on the internet

Latest

All about auth

March 18, 2022

5 reasons to choose Stytch over Auth0 

Latest

All about auth

March 16, 2022

What is WebAuthn?

Latest

All about auth

March 11, 2022

Password reuse is a cybersecurity threat

Latest

All about auth

February 24, 2022

Build vs. buy: what to consider when setting up an auth flow

Latest

All about auth

January 28, 2022

What is the purpose of a refresh token?

Latest

All about auth

January 25, 2022

What is an API? What is an SDK? (And What’s the Difference?)

Latest

All about auth

January 18, 2022

10 common cyber attacks

Latest

All about auth

January 10, 2022

What is MFA (Multi-Factor Authentication) and how does it work?

Latest

All about auth

January 5, 2022

What is credential stuffing? How to prevent credential stuffing attacks

Latest

All about auth

December 17, 2021

An introduction to WebAuthn

authentication vs authorization

Latest

All about auth

November 30, 2021

Authentication vs. Authorization: What You Need to Know

Latest

All about auth

November 11, 2021

A guide to passwordless authentication solutions by business vertical

All about auth

September 16, 2021

Stytch's guide to passwordless authentication

Latest

All about auth

July 30, 2021

How just-in-time authentication boosts security and conversion

Latest

All about auth

July 19, 2021

Forget the password reset flow as you know it

Latest

All about auth

July 12, 2021

Building the future of authentication

All about auth

May 11, 2021

The rise of cool APIs

Get started with Stytch

Sign up or talk to an auth expert to learn how you can improve conversion, retention, and security with Stytch.