loginradiusloginradius Blog

LoginRadius Recognized as the Top Customer IAM Platform of 2024 by CIOReview

CIOReview, a leading US magazine, recently recognized LoginRadius as the top customer IAM platform of 2024 in its latest publication. Discover how LoginRadius secured its position as the premier customer IAM, offering unparalleled scalability, performance, and security to ensure a seamless and reliable user experience.

Rakesh Soni
By Rakesh Soni
March 18, 2024
2 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

Presenting: Progressive Profiling from LoginRadius

A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way.

Deepak Gupta
By Deepak Gupta
February 07, 2019
2 min read

Best Practices for Choosing Good Security Questions

Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.

Deepak Gupta
By Deepak Gupta
January 31, 2019
8 min read

Let's Encrypt with SSL Certificates

What is an SSL Certificate? Let’s start with some working definitions of the HTTP and HTTPS protocols. HTTP is the Internet protocol over…

Ruben Gonzalez
By Ruben Gonzalez
January 14, 2019
3 min read

How Do I Know If My Email Has Been Leaked in a Data Breach?

To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.

Deepak Gupta
By Deepak Gupta
January 10, 2019
5 min read

Encryption and Hashing

Both encryption and hashing have significant uses in cryptology and other fields. One defining difference between them is that encryption is…

Andy Yeung
By Andy Yeung
December 24, 2018
9 min read

The Death of Passwords [Infographic]

Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.

Deepak Gupta
By Deepak Gupta
December 19, 2018
1 min read

Write for us

Top CIAM Platform 2024

Top CIAM Platform 2024

LEARN MORE