Revamped & Ready: Introducing the New Developer-First LoginRadius Website

Revamped & Ready: Introducing the New Developer-First LoginRadius Website

LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.

Rakesh Soni
By Rakesh Soni
February 21, 2025
3 min read
Free Trial

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.


Start Building for Free
How To Throw A Tiki Tech Party

How To Throw A Tiki Tech Party

Except that you hop from start-up offices to start-up offices, Neighborhood Crawl is like a pub crawl. It's an interesting open house event where tourists can check out various start-ups. More than a dozen startups have opened their doors, so thank you to anyone who has taken the time to check us out!

Karl Wittig
By Karl Wittig
September 20, 2019
5 min read
CCPA vs GDPR: Global Compliance Guide [Infographic]

CCPA vs GDPR: Global Compliance Guide [Infographic]

It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.

Rakesh Soni
By Rakesh Soni
September 18, 2019
2 min read
Credential Stuffing: How To Detect And Prevent It

Credential Stuffing: How To Detect And Prevent It

Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.

Rakesh Soni
By Rakesh Soni
September 12, 2019
7 min read
A History of Human Identity in Pictures Part 3

A History of Human Identity in Pictures Part 3

We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.

Rakesh Soni
By Rakesh Soni
September 04, 2019
4 min read
A History of Human Identity in Pictures  Part 2

A History of Human Identity in Pictures Part 2

We covered how identity started in ancient times in Part I of The History of Identity. We concentrate on present times for Part II, where personal names are now considered central to identification and integrity.

Rakesh Soni
By Rakesh Soni
August 20, 2019
6 min read
A History of Human Identity in Pictures - Part 1

A History of Human Identity in Pictures - Part 1

The definition of human identity extends back to unrecorded history for thousands of years. We used language, artefacts, and records long before our identities were digitised and stored in databases to reflect and affirm our individuality.

Rakesh Soni
By Rakesh Soni
August 07, 2019
4 min read
This image shows how LoginRadius powers several secure authentication methods like social login, biometrics, passkeys, passwordless login, and OTP.

LoginRadius Product Roadmap 2025

Watch On-Demand
The State of Consumer Digital ID 2024

The State of Consumer Digital ID 2024

LEARN MORE

Write for us

Top CIAM Platform 2024

Top CIAM Platform 2024

LEARN MORE