loginradiusloginradius Blog

Cloud Security Governance: Protecting Assets in the Digital Frontier

Discover the significance of cloud security governance in safeguarding digital assets as businesses transition to cloud computing. Delve into the best practices and challenges organizations face to ensure data security and compliance in the ever-evolving digital frontier.

Alok Patidar
By Alok Patidar
April 30, 2024
3 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

The Role of Passwordless Authentication in Securing Digital Identity

The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?

Rakesh Soni
By Rakesh Soni
October 11, 2019
10 min read

LoginRadius presents at KuppingerCole Consumer Identity World

We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below.

Deepak Gupta
By Deepak Gupta
October 04, 2019
3 min read

Digital Identity Management: 5 Ways to Win Customer Trust

In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely.

Rakesh Soni
By Rakesh Soni
October 01, 2019
4 min read

CCPA vs GDPR: Global Compliance Guide [Infographic]

It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.

Rakesh Soni
By Rakesh Soni
September 18, 2019
2 min read

Credential Stuffing: How To Detect And Prevent It

Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.

Deepak Gupta
By Deepak Gupta
September 12, 2019
7 min read

A History of Human Identity in Pictures Part 3

We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.

Deepak Gupta
By Deepak Gupta
September 04, 2019
5 min read

Write for us

Top CIAM Platform 2024

Top CIAM Platform 2024

LEARN MORE