Faster JWT Key Rotation in API Gateway

JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the…

Read More >>

Data in the dark: Data protection

Hyperconnectivity is on the rise and, as a result, corporations’ capacity to protect their own and their customers’ data becomes more and more limited. Connection takes place over a network, so, as connection increases, that network increases in size

Read More >>

Each State’s Most-Searched Phobia

  You might feel jumpy around spiders or shudder suddenly when peeking over a cliff. But what gives your neighbors the heebie-jeebies?  In the spirit of All Hallow’s Eve, the safety experts at YourLocalSecurity.com (YLS) are proud to introduce our…

Read More >>