loginradiusloginradius Blog

A Quick Guide To Choosing The Right Zero Trust Vendor

Zero-trust security is imperative in today's digital age. However, choosing the right platform provider can be daunting. Our guide explores crucial factors like security features, scalability, and compliance, empowering you to make the best decision for your organization's cybersecurity needs.

Rakesh Soni
By Rakesh Soni
May 07, 2024
2 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

Presenting: Progressive Profiling from LoginRadius

A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way.

Deepak Gupta
By Deepak Gupta
February 07, 2019
2 min read

Best Practices for Choosing Good Security Questions

Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.

Deepak Gupta
By Deepak Gupta
January 31, 2019
8 min read

How Do I Know If My Email Has Been Leaked in a Data Breach?

To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.

Deepak Gupta
By Deepak Gupta
January 10, 2019
5 min read

The Death of Passwords [Infographic]

Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.

Deepak Gupta
By Deepak Gupta
December 19, 2018
1 min read

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up!

Deepak Gupta
By Deepak Gupta
December 19, 2018
6 min read

The Customer Identity Infrastructure that Cruise Line Passengers Don’t See

In building enormous ships and fun activities to do on them, cruise lines are well-known for their creativity. Some of the major players, both interactive and onboard, are also doing fascinating stuff around customer service.

Rakesh Soni
By Rakesh Soni
December 11, 2018
2 min read

Write for us

Top CIAM Platform 2024

Top CIAM Platform 2024

LEARN MORE