Skip to main content

Posts in “Security

Showing 21 posts in Security.

  1. Battle against search and AI bots on your ngrok endpoints

    Are search and AI bots invading your ngrok endpoints? Fight back with three developer-friendly traffic policies you can deploy in minutes.

  2. Data at ngrok: A primer

    Understand how ngrok handles your data with advanced security measures, offering clarity and control over your traffic flows and storage.

  3. Ingress controller vs. API gateway: A comparison

    Ingress controllers and API gateways have some overlapping functionality, and this post helps you know when to use one over the other—or both!

  4. AI meets privacy: ngrok's secure bridge to customer data

    Explore how ngrok enhances AI development by enabling secure, direct access to customer data, ensuring data integrity and privacy.

    March 14, 2024

  5. Vulnerability management for customer-controlled environments

    Explore vulnerability management in cloud apps, focusing on SaaS accessing customer databases in BYOC environments, with security and compliance insights.

  6. Introducing JWT validation for your API

    ngrok's developer-defined API gateway introduces support for JWT validation. Learn about ngrok's implementation and how to add JWT validation to your APIs.

  7. Add OAuth 2.0 to a Node.js CRUD app

    Secure a Node.js CRUD app using the ngrok JavaScript SDK for stable domain setup. Implement OAuth through Google for user authentication and authorization.

  8. Our next generation firewall project

    Read about how we have improved our firewall and created an open-source Firewall Toolkit in the process.

  9. Bolster control and governance with ngrok Account Domain Controls

    Introducing ngrok Account Domain Controls: Unify user accounts, enforce policies, and secure ngrok usage with ease.

  10. MFA for your production infrastructure running on ngrok

    Learn how ngrok secures your production infrastructure using MFA and Time-Based One Time Passwords (TOTP).

  11. Authentication at the network edge

    Enhance network security with various authentication methods at the network edge. Thwart unauthorized access and minimize attack surfaces.

  12. Add Auth0 Authentication and authorization to ngrok traffic

    Securely add production-grade auth with self-service sign-ups, account recovery, and social auth for multiple platforms - integrate ngrok to Auth0.

  13. Integrating OAuth into your Rust App

    ngrok is useful to run alongside your app. What happens when you embed it and start activating OAuth, webhook verification, load balancing, and more?

  14. Expanding ngrok's free plan with security in one line

    We're adding our security features — OAuth and Webhook validation — to our free plan.

  15. How ngrok Actively Combats Phishing Attacks

    Phishing attacks are one of the most common attacks on the internet, and ngrok is committed to actively trying to stop them.

  16. ngrok becomes Identity Aware with App Users

    See your application users in the ngrok dashboard and view their identity details. This feature is a huge win for security and you can use it today.

  17. There and Back Again: An OAuth Story

    I've worked with OAuth 2.0 for over 6 years. It's always been a complex and challenging beast to fight until now.

  18. ngrok: Defense in Depth

    Securing your environment is challenging. With ngrok, you can centralize management to ensure policies are applied consistently, no matter the stack.

  19. Authentication with ngrok

    In this post, we cover the different methods you can use for authenticating traffic with ngrok, including OAuth and OpenID Connect using Traffic Policy.

  20. Securing your Apps with Cloud Edge

    Use ngrok Cloud Edge for app observability, load balancing, compression, and security – without the burden of running and maintaining middleware infrastructure.

  21. Securing your Applications with OAuth 2.0 in seconds

    ngrok Secure Tunnels. With one command share your apps, APIs, and systems with the world, without complex network configuration, reliability issues, and NAT.