single sign on
The Security Challenges of the Cloud
As more companies transition to the cloud, their sensitive corporate- and compliance-related data are no longer stored and used behind multiple layers of perimeter security. Instead, security teams are faced with multiple ...
Security Boulevard
Why Sign in with Apple Is a Good Thing
Matias Woloski | | Apple, application development, mobile devices, security, Sign in with Apple, single sign on
Mobile app developers who care about security will be excited to implement Sign in with Apple and see how this balance of user experience, privacy and security will propel the industry forward ...
Security Boulevard
Making the Move to Multifactor Authentication
Over the last few years, multifactor authentication (MFA) has come a long way. In the past, MFA required that you carry a hard token on you at all times, but now, it ...
Security Boulevard
Time to Tighten Up Cybersecurity to Fight Tax Fraud
Nicole Castrellon | | Behavioral Monitoring, Blog, enterprise security, Multifactor Authentication, regulations, single sign on, trends
We’ve described cyber criminals as opportunists many times. They’re adept at leveraging big events―from natural disasters to holidays―to their advantage. Like it or not, tax season is one such event that shows ...
What Is Sign in with Apple’s Impact on Development?
Matias Woloski | | Apple, application development, ios, mobile apps, Mobile Security, single sign on
With more than 5 billion mobile phones on the market around the globe, mobile security is more important than ever. And the recent announcement from Apple around its Sign in with Apple guidelines ...
Security Boulevard
A Look Forward to 2020 and a New Decade of Cybersecurity Threats
Jan Sisko | | Behavioral Monitoring, Blog, enterprise security, Multifactor Authentication, regulations, single sign on, trends
Cybersecurity has become a chess match (albeit a fast-paced version) between enterprises and online criminals as they to try to out-maneuver one another. Staying up to date on the latest cyber threats ...
What Is Two-Factor or Multi-Factor Authentication?
Kundan Singh | | autentication, B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, Data Privacy, Data Security, increased data security, Industry News, LoginRadius, MFA, Microsoft, multi-factor, Multi-Factor Authentication, Other, security questions, single sign on, sso, sso identity providers, two factor authentication, two-factor, user data, usernames and passwords
Traditional password-and-username authentication can leave users vulnerable. In 2010 Christopher Chaney, a celebrity obsessed cyber-stalker, got hold of a number of celebrity emails. Using data gleaned from social media and Wikipedia, he ...
Why LoginRadius Is the Best Akamai Identity Cloud (Janrain) Alternative
Garrett Ungaro | | All, B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, janrain, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
In January of 2019, Akamai acquired Janrain and rebranded their CIAM solution as “Identity Cloud,” a platform designed to improve security access controls and identity management. Before the purchase price was revealed, ...
3 Reasons Why B2C Enterprises Should Use Single Sign-on Authentication
Deepak Gupta | | B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
Single sign-on authentication, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between ...
8 Key Components of a Perfect CIAM Platform
Alison Gresik | | B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
A perfect CIAM platform needs to be able to integrate more than just people. There are lots of identity-filled business processes and practices, and in the future the number of these is ...

