Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Alice Liang
LoginRadius

customer identity and access management

Customer Identity and Access Management 2.0: Bridging the Gap of Identity

Alice Liang | June 3, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, Social Login, sso, sso identity providers, user data, user experience, usernames and passwords
Customer identity and access management (CIAM) is taking over the customer login experience. There’s more at stake than just registration and authentication. If all you’re getting from your customers when they log in is an email address to send newsletters and passwords, you’re missing out on a host of benefits ... Read More
LoginRadius
What is CIAM? – Discover the benefits

What is CIAM? – Discover the benefits

Alice Liang | June 3, 2019 | All, B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
Customer identity and access management (CIAM) is taking over the customer login experience. There’s more at stake than just registration and authentication. If all you’re getting from your customers when they log in is an email address to send newsletters and passwords, you’re missing out on a host of benefits ... Read More
Identity Blog
risk-based authentication

How Risk-Based Authentication Creates a Frictionless Customer Experience

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, technology, user data, user experience, usernames and passwords
Failing to securely identify customers when they log in to digital assets is something that all modern organizations fear. Likewise, customers are paying more attention to the risks inherent in the global digital landscape. Businesses and customers alike are more aware than ever that traditional password-only login methods don’t provide ... Read More
LoginRadius
role management

Streamline Customer Experience with Role Management

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, General, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, progressive profiling, role management, security questions, single sign on, sso, sso identity providers, technology, user data, User Data and Social Analytics, user experience, usernames and passwords
Role management is typically part of a user registration system. With it, you can easily define roles for your customers and control access to portions of your digital properties. With LoginRadius Role Management, you can customize and define your customers’ roles, including the default role, and what each role can ... Read More
LoginRadius
data export

Data Export: Access and Export Customer Data with LoginRadius

Alice Liang | May 10, 2019 | B2Community, Best Practices, Business, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, General, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, Social Sharing, Social Stats, sso, sso identity providers, Technical, Technical Updates, technology, user data, User Data and Social Analytics, user experience, usernames and passwords
With the LoginRadius Identity Platform, you can store, organize, and integrate your customer data to seamlessly feed into other systems you may be using. While LoginRadius helps you store and manage your customer data, your company maintains complete ownership of what you do with that data and how you use ... Read More
LoginRadius
sso identity providers

BYOI: Bring Your Own Identity with LoginRadius SSO Identity Providers

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, sso, sso identity providers, technology, user data, user experience, usernames and passwords
Using LoginRadius as your identity provider, you can provide your customers with seamless one-click (single sign-on) access to a number of applications. LoginRadius integrates your OAuth 2 client with LoginRadius. OAuth 2.0 (RFC 6749) is a set of standardized flows that allow you to use LoginRadius as an identity provider ... Read More
LoginRadius
Webinar: 5 Steps to Improving the Omnichannel Customer Journey

Webinar: 5 Steps to Improving the Omnichannel Customer Journey

Alice Liang | February 27, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, Expert Interviews, GDPR, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, Social Login, technology, Uncategorized, user data, user experience, usernames and passwords
If you abandon your customers, your customers will abandon you. Digital transformation has put consumer choice at an all-time high. Companies are constantly looking for ways to increase conversion rates and promote brand loyalty. Creating a personalized customer journey starts with remembering who your customers are so that they feel ... Read More
LoginRadius

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

How to Spot Razy Malware Undetected By AV Systems
Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Drupal Core: Behind the Vulnerability
The Future Of Work: The Hybrid Workforce
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 1 day ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 2 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 3 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.