user data

Airsoft Data Breach Exposes Data of 75,000 Players
Nathan Eddy | | Airsoft, Attack Surface, Data breach, email, gaming, MFA, passwords, pii, social engineering, user data
Failure to configure authentication allowed malicious actors to exploit Airsoftc3.com's database, exposing the sensitive data of a vast number of the gaming site's users ...
Security Boulevard
Avast FTC Fine: Antivirus Vendor Fined $16.5M For Data Sale
Wajahat Raja | | advertising companies, Avast, Avast FTC fine, browsing data, consulting firms, consumer data, Cybersecurity, Cybersecurity News, Data Brokers, data sale, Federal Trade Commission, FTC, FTC chargesheet, Jumpshot, user data
Avast, the famous antivirus software company, has been hit by a $16.5 million fine by the Federal Trade Commission (FTC). The Avast FTC fine was imposed after the FTC revealed that it ...
Safeguarding User Data: How Innovative Technologies Are Bolstering Client Security
Ainsley Lawrence | | Artificial Intelligence, biometrics, Blog, Data breach, data protection, Privacy, user data
As an entrepreneur, you likely know just how valuable data is in the current business landscape. Having access to vast amounts of user data can help you make better-informed operational decisions that ...

Will TikTok Make Good on Privacy Promises?
TikTok has a problem. Researchers continue to turn up oddities with respect to the storage of user data/information. The timing, of course, is precarious for TikTok, as they are under review by ...
Security Boulevard

5 Ways to Enhance Customer Experience in E-commerce
Emily Genge | | All, Authentication, B2Community, CIAM, Conversion, customer data, customer engagement, Customer Experience, Customer Identity Management, Digital Identity, Digital Transformation, increase conversion, Industry News, Other, user data, user experience
E-commerce sales are projected to climb to 10% of all retail revenue for the first time by the end of 2018, with consumers expected to spend a staggering $124.1 billion over the ...

U.S. AG Wants Legal Back Door to All Facebook Postings (and Everything Else)
Mark Rasch | | back door, Department of Justice, DOJ, encryption, facebook, government access, Privacy, user data
When it comes to encryption, we are having another Groundhog Day. The U.S., UK and Australian governments are pressuring Facebook to stop its plans to include “end to end” encryption, which would ...
Security Boulevard

What Is Two-Factor or Multi-Factor Authentication?
Kundan Singh | | autentication, B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, Data Privacy, Data Security, increased data security, Industry News, LoginRadius, MFA, Microsoft, multi-factor, Multi-Factor Authentication, Other, security questions, single sign on, sso, sso identity providers, two factor authentication, two-factor, user data, usernames and passwords
Traditional password-and-username authentication can leave users vulnerable. In 2010 Christopher Chaney, a celebrity obsessed cyber-stalker, got hold of a number of celebrity emails. Using data gleaned from social media and Wikipedia, he ...

Why LoginRadius Is the Best Akamai Identity Cloud (Janrain) Alternative
Garrett Ungaro | | All, B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, janrain, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
In January of 2019, Akamai acquired Janrain and rebranded their CIAM solution as “Identity Cloud,” a platform designed to improve security access controls and identity management. Before the purchase price was revealed, ...

3 Reasons Why B2C Enterprises Should Use Single Sign-on Authentication
Deepak Gupta | | B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
Single sign-on authentication, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between ...

8 Key Components of a Perfect CIAM Platform
Alison Gresik | | B2Community, Best Practices, CIAM, customer data, customer engagement, Customer Experience, customer identity, customer identity and access management, customer identity data, Customer Identity Management, data export, Data Privacy, Data Security, GDPR, Identity Providers, increased data security, Industry News, LoginRadius, Microsoft, Other, password fatigue, password hacking, passwordless, passwords, progressive profiling, Risk-Based Authentication, role management, security questions, single sign on, sso, sso identity providers, user data, usernames and passwords
A perfect CIAM platform needs to be able to integrate more than just people. There are lots of identity-filled business processes and practices, and in the future the number of these is ...