Matthew Tyson

Software Architect

Matthew Tyson is a founder of Dark Horse Group, Inc. He believes in people-first technology. When not playing guitar, Matt explores the backcountry and the philosophical hinterlands. He has written for JavaWorld since 2007.

Intro to crypto wallet authentication

Intro to MongoDB’s queryable encryption

Intro to MongoDB’s queryable encryption

MongoDB 6.0 introduces a preview feature that pulls off the quasi-magical feat of allowing encrypted data to be used as the target of searches, without ever transmitting the keys to the database.

What is zk-SNARK?

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Auth0’s OpenFGA explained: Open source universal authorization

Auth0’s OpenFGA explained: Open source universal authorization

Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and...

What is decentralized identity?

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

The strange business of cybercrime

The strange business of cybercrime

How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.

Auth0’s Matias Woloski on prioritizing the developer experience

Auth0’s Matias Woloski on prioritizing the developer experience

The Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more.

Web3 and IAM: Marching toward disruption

Web3 and IAM: Marching toward disruption

While the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM.

The US federal cybersecurity bureaucracy: A guide

The US federal cybersecurity bureaucracy: A guide

A high-level look at the national offices and organizations involved in protecting the US from cyber threats.

The new cybersecurity mandate

The new cybersecurity mandate

Parsing the White House’s cybersecurity directives.

Ukraine, Conti, and the law of unintended consequences

Ukraine, Conti, and the law of unintended consequences

How the Russian invasion of Ukraine undid the world’s biggest ransomware gang

Load More