Monday, May 12, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Online Identity

customer identity and access management

Customer Identity and Access Management 2.0: Bridging the Gap of Identity

Alice Liang | June 3, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, Social Login, sso, sso identity providers, user data, user experience, usernames and passwords
Customer identity and access management (CIAM) is taking over the customer login experience. There’s more at stake than just registration and authentication. If all you’re getting from your customers when they log ...
LoginRadius
single sign-on

What Is Single Sign-On (SSO)?

Emily Genge | May 30, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, General, Identity Providers, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, technology, user data, user experience, usernames and passwords
The question "what is single sign-on?” is one we get asked a lot. To understand this solution, consider an analogy: “Imagine going to the mall, and at each store you must register ...
LoginRadius
risk-based authentication

How Risk-Based Authentication Creates a Frictionless Customer Experience

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, technology, user data, user experience, usernames and passwords
Failing to securely identify customers when they log in to digital assets is something that all modern organizations fear. Likewise, customers are paying more attention to the risks inherent in the global ...
LoginRadius
role management

Streamline Customer Experience with Role Management

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, General, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, progressive profiling, role management, security questions, single sign on, sso, sso identity providers, technology, user data, User Data and Social Analytics, user experience, usernames and passwords
Role management is typically part of a user registration system. With it, you can easily define roles for your customers and control access to portions of your digital properties. With LoginRadius Role ...
LoginRadius
data export

Data Export: Access and Export Customer Data with LoginRadius

Alice Liang | May 10, 2019 | B2Community, Best Practices, Business, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, data export, Data Privacy, Data Security, GDPR, General, Identity Providers, increased data security, LoginRadius, Marketing, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, Social Sharing, Social Stats, sso, sso identity providers, Technical, Technical Updates, technology, user data, User Data and Social Analytics, user experience, usernames and passwords
With the LoginRadius Identity Platform, you can store, organize, and integrate your customer data to seamlessly feed into other systems you may be using. While LoginRadius helps you store and manage your ...
LoginRadius
sso identity providers

BYOI: Bring Your Own Identity with LoginRadius SSO Identity Providers

Alice Liang | May 10, 2019 | B2Community, Best Practices, CIAM, Conversion, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, sso, sso identity providers, technology, user data, user experience, usernames and passwords
Using LoginRadius as your identity provider, you can provide your customers with seamless one-click (single sign-on) access to a number of applications. LoginRadius integrates your OAuth 2 client with LoginRadius. OAuth 2.0 ...
LoginRadius
IAM vs. CIAM: Which Solution is Right For You?

IAM vs. CIAM: Which Solution is Right For You?

Emily Genge | March 21, 2019 | B2Community, Business, CIAM, ciam vs iam, Comparison, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, iam, increased data security, Infographics, LoginRadius, Online Identity, Productivity Tips, single sign on, Social Login, technology, user experience
Traditional identity management is no longer enough to serve consumers. This should really go without saying. After all, internal management systems were originally built to manage employee identities, and their expectations of ...
LoginRadius
CIAM Continues to Draw Attention as Akamai Acquires Janrain

CIAM Continues to Draw Attention as Akamai Acquires Janrain

Rakesh Soni | March 6, 2019 | B2Community, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, increased data security, LoginRadius, Online Identity, single sign on, user experience
In the past few years, customer identity and access management (CIAM) has been recognized as an independent solution, particularly compared to enterprise IAM. This recognition comes from both analyst firms and from ...
LoginRadius
Webinar: 5 Steps to Improving the Omnichannel Customer Journey

Webinar: 5 Steps to Improving the Omnichannel Customer Journey

Alice Liang | February 27, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, Expert Interviews, GDPR, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, Social Login, technology, Uncategorized, user data, user experience, usernames and passwords
If you abandon your customers, your customers will abandon you. Digital transformation has put consumer choice at an all-time high. Companies are constantly looking for ways to increase conversion rates and promote ...
LoginRadius
looking for a Gigya alternative? Try LoginRadius, a superior and modern identity platform

Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform

Rakesh Soni | February 20, 2019 | B2Community, Best Practices, Business, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity data, Customer Identity Management, Customer Profile Data, Customer Registration, Data Privacy, Data Security, GDPR, increased data security, LoginRadius, Microsoft, Online Identity, password fatigue, password hacking, passwordless, passwords, Productivity Tips, progressive profiling, security questions, single sign on, Technical, technology, user data, User Data and Social Analytics, user experience, usernames and passwords
The customer identity space is in a dynamic phase, with lots of activity around mergers and acquisitions (M&A) and investment. One notable event was the SAP acquisition of Gigya in late 2017 ...
LoginRadius

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations
Is DevEx the Same as DevSecOps?

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Trump Proposes Cutting CISA Budget by $491 Million
Breaking the Password Barrier: FIDO’s Path to Seamless Security
Do the Math: Prime Number Breakthrough Could Upend Encryption 
SMBs Know They’re At Risk, but Most Aren’t Embracing AI
It’s a Mad, Mad World for DDoS; BGP Continues to Confound Security Teams 
LockBit Ransomware Hacked: Database and Victim Chats Leaked
Microsoft Listens to Security Concerns and Delays New OneDrive Sync
Indirect prompt injection attacks target common LLM data sources
Model Context Protocol Adoption and C# SDK Integration in Java
MY TAKE: Beyond agentic AI mediocrity — the real disruption is empowering the disenfranchised

Industry Spotlight

SMBs Know They’re At Risk, but Most Aren’t Embracing AI
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Industry Spotlight Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

SMBs Know They’re At Risk, but Most Aren’t Embracing AI

May 8, 2025 Jeffrey Burt | 3 days ago 0
U.S. Wins One, Maybe Two, Extradition Petitions in Unrelated Cases
Cloud Security Cyberlaw Cybersecurity Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

U.S. Wins One, Maybe Two, Extradition Petitions in Unrelated Cases

May 5, 2025 Jeffrey Burt | May 05 0
California Man Will Plead Guilty to Last Year’s Disney Hack
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

California Man Will Plead Guilty to Last Year’s Disney Hack

May 5, 2025 Jeffrey Burt | May 05 0

Top Stories

OpenText Report Shines Spotlight on Malware Infection Rates
Cybersecurity Data Security Featured News Ransomware Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

OpenText Report Shines Spotlight on Malware Infection Rates

May 9, 2025 Michael Vizard | 2 days ago 0
Trump Proposes Cutting CISA Budget by $491 Million
Cloud Security Cyberlaw Cybersecurity Data Security Featured Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Trump Proposes Cutting CISA Budget by $491 Million

May 7, 2025 Jeffrey Burt | 4 days ago 0
Spyware Maker NSO Ordered to Pay WhatsApp $168 Million for 2019 Hack
Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Spyware Maker NSO Ordered to Pay WhatsApp $168 Million for 2019 Hack

May 7, 2025 Jeffrey Burt | 4 days ago 0

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×