

Matthew Tyson
Software Architect
Matthew Tyson is a founder of Dark Horse Group, Inc. He believes in people-first technology. When not playing guitar, Matt explores the backcountry and the philosophical hinterlands. He has written for JavaWorld and InfoWorld since 2007.

7 guidelines for identifying and mitigating AI-enabled phishing campaigns
Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing...

How passkeys are changing authentication
Well-implemented passkeys can improve the user experience and make it harder for cybercriminals to launch phishing and other attacks.

Intro to crypto wallet authentication
A blockchain enabled cybersecurity future is coming fast, with crypto wallets set to become a central authentication mechanism.

Intro to MongoDB’s queryable encryption
MongoDB 6.0 introduces a preview feature that pulls off the quasi-magical feat of allowing encrypted data to be used as the target of searches, without ever transmitting the keys to the database.

Auth0’s OpenFGA explained: Open source universal authorization
Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and...

What is decentralized identity?
Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

The strange business of cybercrime
How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.

Auth0’s Matias Woloski on prioritizing the developer experience
The Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more.

Web3 and IAM: Marching toward disruption
While the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM.

The US federal cybersecurity bureaucracy: A guide
A high-level look at the national offices and organizations involved in protecting the US from cyber threats.