Revamped & Ready: Introducing the New Developer-First LoginRadius Website

Revamped & Ready: Introducing the New Developer-First LoginRadius Website

LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.

Rakesh Soni
By Rakesh Soni
February 21, 2025
3 min read
Free Trial

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.


Start Building for Free
Best Practices for Choosing Good Security Questions

Best Practices for Choosing Good Security Questions

Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.

Rakesh Soni
By Rakesh Soni
January 31, 2019
8 min read
Let's Encrypt with SSL Certificates

Let's Encrypt with SSL Certificates

What is an SSL Certificate? Let’s start with some working definitions of the HTTP and HTTPS protocols. HTTP is the Internet protocol over…

Ruben Gonzalez
By Ruben Gonzalez
January 14, 2019
3 min read
How Do I Know If My Email Has Been Leaked in a Data Breach?

How Do I Know If My Email Has Been Leaked in a Data Breach?

To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.

Rakesh Soni
By Rakesh Soni
January 10, 2019
4 min read
Encryption and Hashing

Encryption and Hashing

Both encryption and hashing have significant uses in cryptology and other fields. One defining difference between them is that encryption is…

Andy Yeung
By Andy Yeung
December 24, 2018
9 min read
The Death of Passwords [Infographic]

The Death of Passwords [Infographic]

Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.

Rakesh Soni
By Rakesh Soni
December 19, 2018
1 min read
How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up!

Rakesh Soni
By Rakesh Soni
December 19, 2018
5 min read
This image shows how LoginRadius powers several secure authentication methods like social login, biometrics, passkeys, passwordless login, and OTP.

LoginRadius Product Roadmap 2025

Watch On-Demand
The State of Consumer Digital ID 2024

The State of Consumer Digital ID 2024

LEARN MORE

Write for us

Top CIAM Platform 2024

Top CIAM Platform 2024

LEARN MORE