Breached Passwords and Modern Authentication: How Clerk Protects Your App from Known Risks

Breached Passwords and Modern Authentication: How Clerk Protects Your App from Known Risks TL;DR Using passwords found in previous breaches is like leaving your door unlocked for attackers. Developers can stop this risk cold—tools like Clerk Authentication and its competitors (Auth0, Okta, Microsoft Entra ID, and others) automatically block known breached passwords during signup and reset. Let’s break down why this matters, what the latest password dumps look like, and how you can protect your users (and your reputation) in a few lines of code....

July 30, 2025 · 5 min · Jay Klinkowsky

IAM 101 Zero Trust and Identity – Continuous Verification in Practice

IAM 101: Zero Trust and Identity – Continuous Verification in Practice EverydayIdentity TL;DR Zero Trust isn’t a product—it’s a security philosophy. At its core is continuous verification: a principle that access decisions should never rely on a one-time check. This post breaks down how identity, context, device posture, and dynamic access policies form the foundation of Zero Trust, and how IAM teams can implement this model in practice. What Is Zero Trust?...

July 23, 2025 · 3 min · Jay Klinkowsky

Passwords in the Wild: Why Credential Hygiene Still Matters in 2025

Passwords in the Wild: Why Credential Hygiene Still Matters in 2025 In today’s digital age, protecting your online identity and personal information has become more crucial than ever. Cyber threats are continually evolving, and one of the most effective ways to safeguard yourself against these risks is by practicing excellent password hygiene. Here’s why it matters and what steps you can take to ensure your passwords are strong and secure....

March 18, 2025 · 2 min · Jay Klinkowsky