loginradiusloginradius Blog

LoginRadius Releases Consumer Identity Trend Report 2022, Key Login Methods Highlighted

As a company strongly focused on CIAM, LoginRadius analyzed its global customers over the past year and compiled over 40 unique trends in its annual Consumer Identity Trend report 2022.

Rakesh Soni
By Rakesh Soni
April 27, 2022
2 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

Passwordless Authentication: Securing Digital Identity

The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?

Rakesh Soni
By Rakesh Soni
October 11, 2019
8 min read

LoginRadius presents at KuppingerCole Consumer Identity World

We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below.

Deepak Gupta
By Deepak Gupta
October 04, 2019
3 min read

Digital Identity Management: 5 Ways to Win Customer Trust

In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely.

Rakesh Soni
By Rakesh Soni
October 01, 2019
4 min read

CCPA vs GDPR: Global Compliance Guide [Infographic]

It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.

Rakesh Soni
By Rakesh Soni
September 18, 2019
2 min read

Credential Stuffing: How To Detect And Prevent It (Updated)

Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.

Deepak Gupta
By Deepak Gupta
September 12, 2019
7 min read

A History of Human Identity in Pictures Part 3

We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.

Deepak Gupta
By Deepak Gupta
September 04, 2019
5 min read