Archive for the ‘Data Security’ Category

CIAM Continues to Draw Attention as Akamai Acquires Janrain

In the past few years, customer identity and access management (CIAM) has been recognized as an independent solution, particularly compared to enterprise IAM. This recognition comes from both analyst firms and from some major acquisitions happening in the space.

Read more

Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform

The customer identity space is in a dynamic phase, with lots of activity around mergers and acquisitions (M&A) and investment. One notable event was the SAP acquisition of Gigya in late 2017. Now that a year has gone by, existing Gigya contracts are ending. Engineers are probably thinking that everything’s fine and that not much has changed with their customer identity solution. But as a leader, you should be worried. The Gigya technology may not have changed (yet) but the company that delivers it has changed significantly.

Read more

Best Practices for Choosing Good Security Questions

Security questions can add an extra layer of certainty to your authentication process. Security questions are an alternative way of identifying your customers when they have forgotten their password, entered the wrong credentials too many times, or tried to log in from an unfamiliar device or location.

Read more

Why Google Was Fined €50 Million for GDPR Violations

Google has been fined a record €50 million by a French regulator for failing to properly inform users how their data is being collected and used. This fine is the largest to come from European legislation that went into effect in 2018. The European Union’s new privacy law, called the General Data Protection Regulation (GDPR), gives its citizens more control over their data and how companies use it.

Read more

Epic or Fail: Winners and Losers in Customer Data Security

Last year saw some of the largest, most trusted companies like Facebook, Google+, T-Mobile, and Under Armour experience massive customer data breaches. The number and scale of data breaches each year affects companies across every industry and shows no signs of slowing down.

Read more

How Do I Know If My Email Has Been Leaked in a Data Breach?

Many people use their email addresses and a small set of passwords (or even just one password) to log in to their online accounts. Unfortunately, this means that any hacker with your email address already has half your login details. Add in numerous password breaches from big-name digital service providers and you have a recipe for disaster.

Read more

Infographic: The Death of Passwords

Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.

Read more