<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[LoginRadius Blog]]></title><description><![CDATA[Company Updates, Technology Articles from LoginRadius]]></description><link>https://www.loginradius.com/blog/</link><generator>GatsbyJS</generator><lastBuildDate>Wed, 23 Apr 2025 03:32:31 GMT</lastBuildDate><atom:link href="https://www.loginradius.com/blog/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en-us]]></language><item><title><![CDATA[JWT Authentication with LoginRadius: Quick Integration Guide]]></title><description><![CDATA[Discover JWT (JSON Web Token) authentication, its advantages, and how to integrate it seamlessly using LoginRadius' hosted IDX and Direct API methods for secure, scalable identity management.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-integrate-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-integrate-jwt/</guid><category><![CDATA[JWT]]></category><category><![CDATA[JSON Web Token]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Authorization]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 15 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4cedb7829f98208cbc6d5a9aea4e983d/58556/how-to-integrate-jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover JWT (JSON Web Token) authentication, its advantages, and how to integrate it seamlessly using LoginRadius&apos; hosted IDX and Direct API methods for secure, scalable identity management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-integrate-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[What is Strong Authentication in Cybersecurity?]]></title><description><![CDATA[Strong authentication goes beyond passwords by layering multiple independent verification methods—like biometrics, smart devices, and tokens. Learn how it strengthens your cyber defenses, meets compliance standards, and earns customer trust in today’s high-risk digital world.]]></description><link>https://www.loginradius.com/blog/identity/what-is-strong-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-strong-authentication/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[MFA]]></category><category><![CDATA[Identity Management]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 14 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e179c8b04babfaaf552caefc003d8ad1/58556/what-is-strong-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Strong authentication goes beyond passwords by layering multiple independent verification methods—like biometrics, smart devices, and tokens. Learn how it strengthens your cyber defenses, meets compliance standards, and earns customer trust in today’s high-risk digital world. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-strong-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Top 9 User Authentication Methods to Stay Secure in 2025 ]]></title><description><![CDATA[Discover the top authentication methods shaping digital security in 2025. From passwordless login and adaptive MFA to biometrics and secure passkeys, learn how to protect your digital identities effectively. Strengthen security and enhance user experience with future-ready authentication strategies.]]></description><link>https://www.loginradius.com/blog/identity/top-authentication-methods/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/top-authentication-methods/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[Passwordless]]></category><category><![CDATA[MFA]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 11 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0c7a5d6f7885a3d1d8f8ada6b2e5a106/58556/top-authentication-methods.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the top authentication methods shaping digital security in 2025. From passwordless login and adaptive MFA to biometrics and secure passkeys, learn how to protect your digital identities effectively. Strengthen security and enhance user experience with future-ready authentication strategies. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/top-authentication-methods/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Authentication vs Authorization: What's the Difference?]]></title><description><![CDATA[Authentication and authorization are often confused but play very different roles in cybersecurity. This blog breaks down what each term means, why authentication always comes first, and how both work together to keep systems secure. With relatable examples and real-world scenarios, you'll understand the key differences, best practices, and why mastering both is essential for protecting digital assets.]]></description><link>https://www.loginradius.com/blog/identity/authentication-vs-authorization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-vs-authorization/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[Identity Management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1895e9ed05d6e6ca59090c25c4d35de7/58556/authentication-vs-authorization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication and authorization are often confused but play very different roles in cybersecurity. This blog breaks down what each term means, why authentication always comes first, and how both work together to keep systems secure. With relatable examples and real-world scenarios, you&apos;ll understand the key differences, best practices, and why mastering both is essential for protecting digital assets. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-vs-authorization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Complete Guide to JSON Web Token (JWT) and How It Works]]></title><description><![CDATA[Understand JSON Web Tokens (JWT), their compact and secure structure, and their critical role in authentication and authorization. Learn how JWT enables stateless sessions, improves scalability, and secures APIs. This guide explores JWT's working principles and best practices for robust security implementation.]]></description><link>https://www.loginradius.com/blog/engineering/guide-to-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guide-to-jwt/</guid><category><![CDATA[Oauth]]></category><category><![CDATA[Authorization Code Flow]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 07 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/91ea5ae9cba0662d9830e037814a0409/58556/guide-to-jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Understand JSON Web Tokens (JWT), their compact and secure structure, and their critical role in authentication and authorization. Learn how JWT enables stateless sessions, improves scalability, and secures APIs. This guide explores JWT&apos;s working principles and best practices for robust security implementation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guide-to-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Guide to Authentication Methods & Choosing the Right One]]></title><description><![CDATA[Choosing the right authentication method can impact security, compliance, and user experience. This blog breaks down various authentication types and factors to consider in 2025 and also portrays how LoginRadius makes secure, scalable implementation easy.]]></description><link>https://www.loginradius.com/blog/identity/how-to-choose-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-choose-authentication/</guid><category><![CDATA[Identity]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Data Security]]></category><category><![CDATA[Data Privacy]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 07 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8c1688ce65a6d84599fb333cba7bf065/58556/how-to-choose-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Choosing the right authentication method can impact security, compliance, and user experience. This blog breaks down various authentication types and factors to consider in 2025 and also portrays how LoginRadius makes secure, scalable implementation easy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-choose-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Identification and Authentication: A Quick Comparison]]></title><description><![CDATA[In digital security, identification introduces who you are, authentication verifies your identity, and authorization defines your access. Clearly understanding these distinct roles is essential to protecting sensitive data and ensuring robust access control. Let's explore their differences in detail.]]></description><link>https://www.loginradius.com/blog/identity/identification-and-authorization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identification-and-authorization/</guid><category><![CDATA[Identity management]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/960446e6fe12be2aaf9884496d41454f/58556/identification-and-authorization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In digital security, identification introduces who you are, authentication verifies your identity, and authorization defines your access. Clearly understanding these distinct roles is essential to protecting sensitive data and ensuring robust access control. Let&apos;s explore their differences in detail. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identification-and-authorization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Understanding Authentication, Authorization, and Encryption]]></title><description><![CDATA[Authentication, authorization, and encryption are the backbone of modern digital security. This guide breaks down each term with real-world clarity and practical examples. Learn how they work together to protect identities, control access, and secure your data.]]></description><link>https://www.loginradius.com/blog/identity/authentication-authorization-encryption/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-authorization-encryption/</guid><category><![CDATA[Identity management]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Encryption]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 01 Apr 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/753c7a0af70ba868e88cafc177bd080a/58556/authentication-authorization-encryption.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication, authorization, and encryption are the backbone of modern digital security. This guide breaks down each term with real-world clarity and practical examples. Learn how they work together to protect identities, control access, and secure your data. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-authorization-encryption/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[A comprehensive guide to OAuth 2.0 ]]></title><description><![CDATA[Ever clicked "Login with Google"? That’s OAuth 2.0 behind the scenes—securely granting apps access to your data without sharing passwords. In this guide, we break down what OAuth 2.0 is, how it improves upon OAuth 1.0, and why it’s become the industry standard for secure authorization in APIs, mobile apps, and web platforms.]]></description><link>https://www.loginradius.com/blog/engineering/what-is-oauth2-0/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-oauth2-0/</guid><category><![CDATA[Oauth]]></category><category><![CDATA[Authorization Code Flow]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 27 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/10110df34137352f90a286528d35df2e/58556/what-is-oauth2-0.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Ever clicked &quot;Login with Google&quot;? That’s OAuth 2.0 behind the scenes—securely granting apps access to your data without sharing passwords. In this guide, we break down what OAuth 2.0 is, how it improves upon OAuth 1.0, and why it’s become the industry standard for secure authorization in APIs, mobile apps, and web platforms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-oauth2-0/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Introducing the LoginRadius Trust Center: Always Up-to-Date and at Your Fingertips ]]></title><description><![CDATA[We’re happy to introduce the LoginRadius Trust Center—a centralized, always-available repository for our customers, prospects, and partners to access up-to-date certifications, legal policies, and security documentation. It reflects our core value of “transparency: be open and accountable”.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-trust-center/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-trust-center/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[Developer Tools]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 27 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/550b583e41804d24de90a36d780eb32a/58556/loginradius-trust-center.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We’re happy to introduce the LoginRadius Trust Center—a centralized, always-available repository for our customers, prospects, and partners to access up-to-date certifications, legal policies, and security documentation. It reflects our core value of “transparency: be open and accountable”. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-trust-center/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[What is Token Authentication and How Does It Work?]]></title><description><![CDATA[As digital systems evolve toward APIs and microservices, traditional access methods no longer cut it. Token-based authentication—fast, scalable, and secure—has emerged as the standard, especially after OAuth 2.0's release in 2012. This blog explores what it is, how it works, and why it’s essential for modern applications.]]></description><link>https://www.loginradius.com/blog/identity/what-is-token-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-token-authentication/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 25 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/679a5ccbfd640c302f8a98c1c86b891f/58556/what-is-token-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As digital systems evolve toward APIs and microservices, traditional access methods no longer cut it. Token-based authentication—fast, scalable, and secure—has emerged as the standard, especially after OAuth 2.0&apos;s release in 2012. This blog explores what it is, how it works, and why it’s essential for modern applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-token-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[What is OTP Authentication and How Does it Work?]]></title><description><![CDATA[Learn what OTP authentication is, the key differences between HOTP and TOTP, and how it enhances user security. Discover how LoginRadius simplifies implementing reliable, MFA-ready OTP solutions to secure your digital experiences.]]></description><link>https://www.loginradius.com/blog/identity/what-is-otp-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-otp-authentication/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/280b276fd95271513e78f63132fe9859/58556/what-is-OTP-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn what OTP authentication is, the key differences between HOTP and TOTP, and how it enhances user security. Discover how LoginRadius simplifies implementing reliable, MFA-ready OTP solutions to secure your digital experiences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-otp-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Role-Based Access Control (RBAC)?]]></title><description><![CDATA[Role-Based Access Control (RBAC) is a security model that assigns permissions based on predefined organizational roles rather than individual users. By linking users to roles, RBAC simplifies access management, enhances security, and ensures structured control across your organization. Read on to discover how RBAC works and how it can streamline your user management processes.]]></description><link>https://www.loginradius.com/blog/identity/what-is-rbac/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-rbac/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[ABAC]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 21 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8e65c096ea21ab26402060bea16fa32a/58556/what-is-rbac.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Role-Based Access Control (RBAC) is a security model that assigns permissions based on predefined organizational roles rather than individual users. By linking users to roles, RBAC simplifies access management, enhances security, and ensures structured control across your organization. Read on to discover how RBAC works and how it can streamline your user management processes. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-rbac/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Launches Next-Generation CIAM Console: Self-Serve, No-Code, and Built for Speed]]></title><description><![CDATA[The all-new LoginRadius console delivers a no-code/low-code experience that transforms complex development projects into a straightforward configuration process. You can now implement sophisticated authentication flows, configure security policies, and customize the entire user experience—all without writing a single line of code.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-self-serve-no-code-ciam-console/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-self-serve-no-code-ciam-console/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Ciam Platform]]></category><category><![CDATA[Developer Tools]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 20 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3e06b0ed87304d488c90db1de0672617/58556/loginradius-self-serve-no-code-ciam-console.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The all-new LoginRadius console delivers a no-code/low-code experience that transforms complex development projects into a straightforward configuration process. You can now implement sophisticated authentication flows, configure security policies, and customize the entire user experience—all without writing a single line of code. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-self-serve-no-code-ciam-console/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Quick Guide to Single-factor, Two-factor, and Multi-factor Authentication]]></title><description><![CDATA[Authentication methods like Single-Factor (1FA), Two-Factor (2FA), and Multi-Factor (MFA) determine your account security. Learn their differences, benefits, and why MFA is the strongest defense against cyber threats.]]></description><link>https://www.loginradius.com/blog/identity/1fa-vs-2fa-vs-mfa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/1fa-vs-2fa-vs-mfa/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[CIAM Security]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1db3ae26b8f6212cc1301c1003b18ee1/58556/1fa-vs-2fa-vs-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication methods like Single-Factor (1FA), Two-Factor (2FA), and Multi-Factor (MFA) determine your account security. Learn their differences, benefits, and why MFA is the strongest defense against cyber threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/1fa-vs-2fa-vs-mfa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Democratizing Authentication: Introducing LoginRadius' Free Forever Developer Plan]]></title><description><![CDATA[Developers, say hello to enterprise-grade authentication at zero cost! The LoginRadius Free Forever Developer Plan empowers you with passwordless authentication, passkeys, and unlimited social logins—all with no hidden fees or forced upgrades. Build secure apps without worrying about authentication costs.]]></description><link>https://www.loginradius.com/blog/identity/free-developer-plan-for-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/free-developer-plan-for-authentication/</guid><category><![CDATA[authentication]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[developer tools]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 13 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2e8f17aa9b3f28821f5e539a08dfed23/58556/free-developer-plan-for-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Developers, say hello to enterprise-grade authentication at zero cost! The LoginRadius Free Forever Developer Plan empowers you with passwordless authentication, passkeys, and unlimited social logins—all with no hidden fees or forced upgrades. Build secure apps without worrying about authentication costs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/free-developer-plan-for-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Mobile Authentication: Everything You Need to Know]]></title><description><![CDATA[With evolving mobile threats, securing access to personal and business data is critical. This blog covers key mobile security risks, compares traditional vs. advanced authentication methods, and explores future trends shaping mobile identity security.]]></description><link>https://www.loginradius.com/blog/identity/mobile-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mobile-authentication/</guid><category><![CDATA[”Identity Management”]]></category><category><![CDATA[”User Authentication”]]></category><category><![CDATA[“CIAM Security”]]></category><category><![CDATA[“Authentication”]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 07 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3091093f002cbf1ebbbc5c1390e90f1a/58556/mobile-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With evolving mobile threats, securing access to personal and business data is critical. This blog covers key mobile security risks, compares traditional vs. advanced authentication methods, and explores future trends shaping mobile identity security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mobile-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Code Less, Build More: Unveiling LoginRadius' AI-Powered Developer Documentation]]></title><description><![CDATA[We rebuilt our docs from the ground up with a developer-first mindset. Now, navigation feels seamless, content follows a logical step-by-step approach, and jumping between topics feels effortless. Let’s start by exploring the new documentation structure and how it improves your workflow.]]></description><link>https://www.loginradius.com/blog/identity/revamped-loginradius-docs-with-developer-first-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/revamped-loginradius-docs-with-developer-first-experience/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 05 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/468ca66a73007ebe27e1f8a028fcd319/58556/hero-section.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We rebuilt our docs from the ground up with a developer-first mindset. Now, navigation feels seamless, content follows a logical step-by-step approach, and jumping between topics feels effortless. Let’s start by exploring the new documentation structure and how it improves your workflow. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/revamped-loginradius-docs-with-developer-first-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Push Notification Authentication and How It Works?]]></title><description><![CDATA[Push notification authentication enhances security by allowing users to verify login attempts with a simple tap on their mobile devices. It eliminates the need for passwords and OTPs, reducing the risk of phishing and credential theft. Learn how push authentication works, its benefits, and how to integrate it into your applications.]]></description><link>https://www.loginradius.com/blog/identity/push-notification-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/push-notification-authentication/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[CIAM Security]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 05 Mar 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0f20e4acb3f64c738245f57e3bf7bcc3/58556/push-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Push notification authentication enhances security by allowing users to verify login attempts with a simple tap on their mobile devices. It eliminates the need for passwords and OTPs, reducing the risk of phishing and credential theft. Learn how push authentication works, its benefits, and how to integrate it into your applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/push-notification-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Types of Multi Factor Authentication & How to Pick the Best]]></title><description><![CDATA[Cyber threats are evolving, and passwords alone aren't enough. Multi-Factor Authentication (MFA) adds extra layers of security by requiring multiple verification methods. Explore different MFA types—from biometrics to passkeys—and find the best authentication strategy for your needs.]]></description><link>https://www.loginradius.com/blog/identity/types-of-mfa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/types-of-mfa/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[CIAM Security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 28 Feb 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8494bb0ea1cf994304b5db01b24a4fe/58556/types-of-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cyber threats are evolving, and passwords alone aren&apos;t enough. Multi-Factor Authentication (MFA) adds extra layers of security by requiring multiple verification methods. Explore different MFA types—from biometrics to passkeys—and find the best authentication strategy for your needs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/types-of-mfa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Risk-Based Authentication vs. MFA: Key Differences Explained]]></title><description><![CDATA[With cyber threats on the rise, organizations need stronger authentication methods. Multi-Factor Authentication (MFA) adds extra security layers, while Risk-Based Authentication (RBA) adapts based on user behavior and risk levels. In this blog, we’ll explore MFA vs RBA, their benefits, and how they enhance security for businesses.]]></description><link>https://www.loginradius.com/blog/identity/mfa-vs-rba/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mfa-vs-rba/</guid><category><![CDATA[API]]></category><category><![CDATA[Identity Management]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[CIAM Security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 27 Feb 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/edcd19470ad543ebda9bf1653aa68f74/58556/banner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With cyber threats on the rise, organizations need stronger authentication methods. Multi-Factor Authentication (MFA) adds extra security layers, while Risk-Based Authentication (RBA) adapts based on user behavior and risk levels. In this blog, we’ll explore MFA vs RBA, their benefits, and how they enhance security for businesses. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mfa-vs-rba/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Revamped & Ready: Introducing the New Developer-First LoginRadius Website]]></title><description><![CDATA[LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.]]></description><link>https://www.loginradius.com/blog/identity/developer-first-identity-provider-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/developer-first-identity-provider-loginradius/</guid><category><![CDATA[Developer tools]]></category><category><![CDATA[API]]></category><category><![CDATA[Identity Management]]></category><category><![CDATA[User Authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 21 Feb 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/developer-first-identity-provider-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is SCIM? A Developer's Guide to Understanding and Using SCIM]]></title><description><![CDATA[Learn how SCIM streamlines cross-domain identity management, automates user provisioning, and ensures secure integration for modern applications.]]></description><link>https://www.loginradius.com/blog/identity/what-is-scim/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-scim/</guid><category><![CDATA[SCIM]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 17 Jan 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/257e4f7e83fe3c711f745d2ed519ca66/a3e81/scim.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how SCIM streamlines cross-domain identity management, automates user provisioning, and ensures secure integration for modern applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-scim/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[RBAC vs ABAC: A Developer’s Guide to Choosing the Right Fit]]></title><description><![CDATA[RBAC vs ABAC: A detailed guide for developers to understand role-based and attribute-based access control, their differences, and the right fit for your projects.]]></description><link>https://www.loginradius.com/blog/identity/rbac-vs-abac/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/rbac-vs-abac/</guid><category><![CDATA[RBAC]]></category><category><![CDATA[ABAC]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 13 Jan 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee38e7cca65fbecf7e51368009af4227/58556/lock-business-background-security-concept-3d-rendering.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; RBAC vs ABAC: A detailed guide for developers to understand role-based and attribute-based access control, their differences, and the right fit for your projects. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/rbac-vs-abac/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[CISOs’ Top Cybersecurity Threats 2025: Scattered Spider, Deepfakes, and More]]></title><description><![CDATA[From Scattered Spider ransomware to deepfake identities, 2025 poses critical cybersecurity challenges for CISOs. Discover strategies to protect your organization.]]></description><link>https://www.loginradius.com/blog/identity/cisos-top-cybersecurity-threats-from-scattered-spider-to-deepfakes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cisos-top-cybersecurity-threats-from-scattered-spider-to-deepfakes/</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 06 Jan 2025 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/87bf20dfd072e5436241347f7564fd93/58556/lock-business-background-security-concept-3d-rendering.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; From Scattered Spider ransomware to deepfake identities, 2025 poses critical cybersecurity challenges for CISOs. Discover strategies to protect your organization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cisos-top-cybersecurity-threats-from-scattered-spider-to-deepfakes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius 2024: A Year of CIAM Innovations]]></title><description><![CDATA[LoginRadius wraps up 2024 with transformative CIAM innovations for developers. From Identity Orchestration and Multi-Brand Configuration to Passkeys and a new Admin Console, explore tools designed to simplify workflows and enhance security.]]></description><link>https://www.loginradius.com/blog/identity/year-of-ciam-innovations-with-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/year-of-ciam-innovations-with-loginradius/</guid><category><![CDATA[CIAM Innovation]]></category><category><![CDATA[digital identity transformation]]></category><category><![CDATA[ciam management​]]></category><category><![CDATA[ciam security​]]></category><category><![CDATA[ciam technology]]></category><category><![CDATA[ciam integration​]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 31 Dec 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/428ce8268a48330fe86dbdca938a5460/58556/background-red-3d-podium-with-mobile-screen-mockup-megaphone.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius wraps up 2024 with transformative CIAM innovations for developers. From Identity Orchestration and Multi-Brand Configuration to Passkeys and a new Admin Console, explore tools designed to simplify workflows and enhance security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/year-of-ciam-innovations-with-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Passkey Authentication - A Complete Guide]]></title><description><![CDATA[Learn about passkey authentication, its role in passwordless authentication, how it ensures secure logins, and its usability across multiple devices and users.]]></description><link>https://www.loginradius.com/blog/identity/what-is-passkey-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-passkey-authentication/</guid><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 30 Dec 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/22b3011856459cf362f15069189e89c2/9b99b/hacker.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about passkey authentication, its role in passwordless authentication, how it ensures secure logins, and its usability across multiple devices and users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-passkey-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[How AI-Enabled Cybersecurity Solutions Are Strengthening Our Online Security]]></title><description><![CDATA[CIAM gets a major upgrade with AI, which secures customer identities, streamlines access, and ensures only the right people get in. But we can't just set it and forget it. Discover why AI is a game changer, key applications in the field, and what the future looks like with AI advancements.]]></description><link>https://www.loginradius.com/blog/identity/ai-cybersecurity-online-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ai-cybersecurity-online-security/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[AI]]></category><category><![CDATA[customer identity]]></category><dc:creator><![CDATA[Carl Torrence]]></dc:creator><pubDate>Mon, 30 Sep 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ead105149613529eb49bd7e0b4642b1/58556/cyber-security-technology-online-data-protection-by-ai-robot.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIAM gets a major upgrade with AI, which secures customer identities, streamlines access, and ensures only the right people get in. But we can&apos;t just set it and forget it. Discover why AI is a game changer, key applications in the field, and what the future looks like with AI advancements. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ai-cybersecurity-online-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Carl Torrence&amp;size=100</authorImage></item><item><title><![CDATA[What is Identity Orchestration]]></title><description><![CDATA[Identity orchestration is revolutionizing the way businesses handle digital identities, offering a seamless and secure user experience. In this article, we explain the fundamental concepts of identity orchestration, explore its benefits, and discuss how it can transform identity management for organizations.]]></description><link>https://www.loginradius.com/blog/identity/what-is-identity-orchestration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-identity-orchestration/</guid><category><![CDATA[authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cloud environment]]></category><category><![CDATA[ux]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/37d928758e0ca92dcfb1898f7a866d11/a3e81/identity-orchestration-hero.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity orchestration is revolutionizing the way businesses handle digital identities, offering a seamless and secure user experience. In this article, we explain the fundamental concepts of identity orchestration, explore its benefits, and discuss how it can transform identity management for organizations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-identity-orchestration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Releases 2024 Consumer Identity Report, Highlights the Shifting Trends in Consumer Preferences]]></title><description><![CDATA[LoginRadius analyzed data from its Consumer IAM (CIAM) Platform, utilized by over 500 brands globally. The report offers a unique perspective on global consumer identity trends in 2024, delivering insights into consumer behavior regarding digital identities and providing a comprehensive analysis of their behavior patterns and lifecycle.]]></description><link>https://www.loginradius.com/blog/identity/consumer-digital-identity-trends-report-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/consumer-digital-identity-trends-report-2024/</guid><category><![CDATA[industry-news]]></category><category><![CDATA[consumer-identity]]></category><category><![CDATA[identity-trends]]></category><category><![CDATA[digital-identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e5aa10034bd82f98f04ecca5aae937db/7f8e9/trends-report-2024.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius analyzed data from its Consumer IAM (CIAM) Platform, utilized by over 500 brands globally. The report offers a unique perspective on global consumer identity trends in 2024, delivering insights into consumer behavior regarding digital identities and providing a comprehensive analysis of their behavior patterns and lifecycle. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/consumer-digital-identity-trends-report-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Celebrating 8th Year Milestone: How Our Collaboration with a Leading Healthcare Company Transformed Millions of Lives]]></title><description><![CDATA[Discover how LoginRadius transformed authentication for a global healthcare leader, enhancing patient identity management and boosting user accounts by 20.18%. Explore our 8-year journey of digital innovation, seamless integration, and exceptional service.]]></description><link>https://www.loginradius.com/blog/identity/lr-reshapes-authentication-healthcare-company/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/lr-reshapes-authentication-healthcare-company/</guid><category><![CDATA[healthcare]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Ritika Kapahi]]></dc:creator><pubDate>Wed, 28 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ffd5ec715cebdfcdc30330de83f71676/7f8e9/healthcare.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover how LoginRadius transformed authentication for a global healthcare leader, enhancing patient identity management and boosting user accounts by 20.18%. Explore our 8-year journey of digital innovation, seamless integration, and exceptional service. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/lr-reshapes-authentication-healthcare-company/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ritika Kapahi&amp;size=100</authorImage></item><item><title><![CDATA[Unlock Your Digital Freedom: How Automating Passwordless Authentication Can Transform Your Security]]></title><description><![CDATA[In a world where cybersecurity threats are ever-evolving, automating passwordless authentication emerges as a game-changer. Learn how this innovative approach can not only bolster your security but also streamline the user experience and pave the way for a more secure digital future.]]></description><link>https://www.loginradius.com/blog/identity/passwordless-authentication-automation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passwordless-authentication-automation/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 27 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/46768450fe719be8ef338a0801257a55/7f8e9/password-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In a world where cybersecurity threats are ever-evolving, automating passwordless authentication emerges as a game-changer. Learn how this innovative approach can not only bolster your security but also streamline the user experience and pave the way for a more secure digital future. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passwordless-authentication-automation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Mastering Orchestration: The Business Case for End-to-End Identity Proofing Solutions]]></title><description><![CDATA[In the rapidly evolving digital landscape, businesses are turning to comprehensive identity-proofing solutions to bolster security, ensure compliance, and enhance customer experiences. By leveraging orchestration, companies can streamline identity verification processes, reduce fraud, and build trust with their users.]]></description><link>https://www.loginradius.com/blog/growth/identity-proofing-orchestration-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-proofing-orchestration-security/</guid><category><![CDATA[identity orchestration]]></category><category><![CDATA[identity proofing]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Mon, 12 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ddb2ad28a074a03492e8f8b0099b207/7f8e9/id-proofing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the rapidly evolving digital landscape, businesses are turning to comprehensive identity-proofing solutions to bolster security, ensure compliance, and enhance customer experiences. By leveraging orchestration, companies can streamline identity verification processes, reduce fraud, and build trust with their users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-proofing-orchestration-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[How To Secure GenAI by Implementing RBAC In The Enterprise]]></title><description><![CDATA[Generative AI (GenAI) is revolutionizing enterprises, but security challenges loom large. Implementing Role-Based Access Control (RBAC) offers a robust solution. This article explores how defining roles, mapping permissions, and enforcing access controls can protect your GenAI systems, ensuring secure and innovative AI-driven solutions.]]></description><link>https://www.loginradius.com/blog/identity/securing-gen-ai-rbac-implementation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/securing-gen-ai-rbac-implementation/</guid><category><![CDATA[ai]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 12 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/742365bc5de5cf86e782340e068292df/7f8e9/gen-ai-rbac.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Generative AI (GenAI) is revolutionizing enterprises, but security challenges loom large. Implementing Role-Based Access Control (RBAC) offers a robust solution. This article explores how defining roles, mapping permissions, and enforcing access controls can protect your GenAI systems, ensuring secure and innovative AI-driven solutions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/securing-gen-ai-rbac-implementation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[The Hidden Pitfalls: Why Most CIAM Systems Fail Under Pressure]]></title><description><![CDATA[In times of crisis, companies often find their Customer Identity and Access Management (CIAM) systems under immense pressure. This article explains the common reasons for CIAM failures during emergencies and offers actionable strategies to fortify these systems, ensuring robust security and seamless user experiences.]]></description><link>https://www.loginradius.com/blog/identity/ciam-systems-hidden-pitfalls/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-systems-hidden-pitfalls/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam resilience]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f663fc9fee91636ed4ec7bae868ba8b2/7f8e9/hidden-pitfalls.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In times of crisis, companies often find their Customer Identity and Access Management (CIAM) systems under immense pressure. This article explains the common reasons for CIAM failures during emergencies and offers actionable strategies to fortify these systems, ensuring robust security and seamless user experiences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-systems-hidden-pitfalls/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[No More Login Hassles: Effortless Migration to LoginRadius Awaits]]></title><description><![CDATA[Tired of login woes? Discover how an effortless migration to LoginRadius can revolutionize your user identity management, providing a seamless, secure, and efficient experience for both your business and users.]]></description><link>https://www.loginradius.com/blog/identity/effortless-migration-login-hassles/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/effortless-migration-login-hassles/</guid><category><![CDATA[ciam authentication]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 01 Aug 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e42f317c0badff8f88fdc0c21d701aa6/7f8e9/effortless-migration.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Tired of login woes? Discover how an effortless migration to LoginRadius can revolutionize your user identity management, providing a seamless, secure, and efficient experience for both your business and users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/effortless-migration-login-hassles/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[How Cookie Management Supports GDPR and CCPA Compliance]]></title><description><![CDATA[Discover the main principles of GDPR and CCPA, the purpose of cookie management, how it supports compliance, the different types of cookie management tools available, and tips for choosing the right tool for your business.]]></description><link>https://www.loginradius.com/blog/identity/cookie-management-gdpr-ccpa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cookie-management-gdpr-ccpa/</guid><category><![CDATA[cookie management]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Jaqueline Kispert]]></dc:creator><pubDate>Wed, 31 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1f2d6521bc9c70da86030f74ad2f690/7f8e9/cookie-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the main principles of GDPR and CCPA, the purpose of cookie management, how it supports compliance, the different types of cookie management tools available, and tips for choosing the right tool for your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cookie-management-gdpr-ccpa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jaqueline Kispert&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Launches Identity Orchestration for Seamless Identity Workflows]]></title><description><![CDATA[Managing identity in today's digital world requires innovative solutions. LoginRadius launches Identity Orchestration, a no-code/low-code solution to streamline identity workflows and enhance user experiences. This feature empowers enterprises to easily dynamically build, test, deploy, and manage identity use cases.]]></description><link>https://www.loginradius.com/blog/identity/lr-launches-identity-orchestration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/lr-launches-identity-orchestration/</guid><category><![CDATA[identity orchestration]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a3029a06623a3c4647f7c4fdc056b494/7f8e9/identity-orchestration.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Managing identity in today&apos;s digital world requires innovative solutions. LoginRadius launches Identity Orchestration, a no-code/low-code solution to streamline identity workflows and enhance user experiences. This feature empowers enterprises to easily dynamically build, test, deploy, and manage identity use cases. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/lr-launches-identity-orchestration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Breakthrough Innovations: How AI is Transforming Compliance]]></title><description><![CDATA[Artificial Intelligence is reshaping the landscape of compliance with groundbreaking innovations. Here are five transformative ways AI is revolutionizing compliance, offering enhanced accuracy, efficiency, and risk management.]]></description><link>https://www.loginradius.com/blog/growth/ai-innovations-transforming-compliance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ai-innovations-transforming-compliance/</guid><category><![CDATA[ai]]></category><category><![CDATA[consent management]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 23 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/945234c719dbd5e8adfb493ea47e6fbd/7f8e9/ai-compliance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Artificial Intelligence is reshaping the landscape of compliance with groundbreaking innovations. Here are five transformative ways AI is revolutionizing compliance, offering enhanced accuracy, efficiency, and risk management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ai-innovations-transforming-compliance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Passkeys: Unlocking Benefits for a Better Online Shopping Experience]]></title><description><![CDATA[Passkeys are revolutionizing how we shop online, providing a seamless, secure, and convenient experience. This blog explores the major benefits of using passkeys and how they can transform your online shopping journey.]]></description><link>https://www.loginradius.com/blog/identity/passkeys-online-shopping-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passkeys-online-shopping-experience/</guid><category><![CDATA[passkeys]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Tue, 23 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/72d28ee9635126585667b460af4d373d/7f8e9/online-shopping.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Passkeys are revolutionizing how we shop online, providing a seamless, secure, and convenient experience. This blog explores the major benefits of using passkeys and how they can transform your online shopping journey. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passkeys-online-shopping-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[Happy Birthday, LoginRadius: One Year Away from the Big Teen Milestone!]]></title><description><![CDATA[As LoginRadius celebrates its 12th anniversary, we reflect on a year filled with significant milestones and innovations. From groundbreaking features like Push Notification MFA and Passkeys to impactful CSR initiatives, we continue to set new standards in digital identity and social responsibility. Join us in celebrating our journey, and looking forward to an exciting future.]]></description><link>https://www.loginradius.com/blog/growth/happy-12th-birthday-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/happy-12th-birthday-loginradius/</guid><category><![CDATA[LoginRadius birthday]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Sat, 20 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/69f50a7201ac2c653e861be00e9f92b0/7f8e9/bday-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As LoginRadius celebrates its 12th anniversary, we reflect on a year filled with significant milestones and innovations. From groundbreaking features like Push Notification MFA and Passkeys to impactful CSR initiatives, we continue to set new standards in digital identity and social responsibility. Join us in celebrating our journey, and looking forward to an exciting future. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/happy-12th-birthday-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Strengthening Digital Customer Onboarding to Combat Deep Fakes]]></title><description><![CDATA[As deepfake technology advances, the risk of fraudulent activities in digital customer onboarding increases. This article explores how to safeguard your onboarding processes against deepfakes, ensuring a secure and trustworthy experience for your customers.]]></description><link>https://www.loginradius.com/blog/growth/protect-digital-customer-onboarding-deepfakes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/protect-digital-customer-onboarding-deepfakes/</guid><category><![CDATA[customer onboarding]]></category><category><![CDATA[cx]]></category><category><![CDATA[deepfake]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 15 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e1adc66a80938dd69c649a6c34cc8eed/a3e81/deepfake.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As deepfake technology advances, the risk of fraudulent activities in digital customer onboarding increases. This article explores how to safeguard your onboarding processes against deepfakes, ensuring a secure and trustworthy experience for your customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/protect-digital-customer-onboarding-deepfakes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[AI and the Changing Face of Enterprise Security Threats]]></title><description><![CDATA[Explore how AI is revolutionizing enterprise security by improving threat detection, prevention, and response. Learn about the new challenges and opportunities that AI brings to the cybersecurity landscape.]]></description><link>https://www.loginradius.com/blog/identity/ai-enterprise-security-threats/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ai-enterprise-security-threats/</guid><category><![CDATA[enterprise security]]></category><category><![CDATA[ai]]></category><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 15 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1edf0a804dc0a708a9936684c073835b/58556/future-artificial-intelligence-robot-cyborg.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore how AI is revolutionizing enterprise security by improving threat detection, prevention, and response. Learn about the new challenges and opportunities that AI brings to the cybersecurity landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ai-enterprise-security-threats/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Leading the Charge in Customer IAM: LoginRadius Recognized as an Overall Leader by KuppingerCole]]></title><description><![CDATA[KuppingerCole's 2024 Leadership Compass reports recognize LoginRadius as an overall leader in customer identity and access management (CIAM). LoginRadius excels in innovative workflow management, extensive integration capabilities, comprehensive B2B features, and top-tier security standards. ]]></description><link>https://www.loginradius.com/blog/identity/kuppingercole-names-lr-ciam-leader-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/kuppingercole-names-lr-ciam-leader-2024/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[coverage]]></category><category><![CDATA[b2b]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 10 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0f683b83653183c93c2412a3ee601189/7f8e9/kc-lr-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; KuppingerCole&apos;s 2024 Leadership Compass reports recognize LoginRadius as an overall leader in customer identity and access management (CIAM). LoginRadius excels in innovative workflow management, extensive integration capabilities, comprehensive B2B features, and top-tier security standards.  &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/kuppingercole-names-lr-ciam-leader-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Chrome’s Third-Party Cookie Restrictions Affect User Authentication?]]></title><description><![CDATA[Google Chrome has planned to phase out third-party cookies, which will affect different website functionalities depending on third-party cookies. This blog focuses on how this phase-out affects identity and user authentication and discusses alternatives for overcoming challenges.]]></description><link>https://www.loginradius.com/blog/engineering/identity-impact-of-google-chrome-thirdparty-cookie-restrictions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/identity-impact-of-google-chrome-thirdparty-cookie-restrictions/</guid><category><![CDATA[Identity]]></category><category><![CDATA[Cookies]]></category><category><![CDATA[Chrome]]></category><dc:creator><![CDATA[Raghunath Reddy]]></dc:creator><pubDate>Mon, 08 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ebbdb7f95803a90edc47043ea18e584/58556/third-party-cookies-phaseout-chrome.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Google Chrome has planned to phase out third-party cookies, which will affect different website functionalities depending on third-party cookies. This blog focuses on how this phase-out affects identity and user authentication and discusses alternatives for overcoming challenges. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/identity-impact-of-google-chrome-thirdparty-cookie-restrictions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/raghunath-r-a.png?size=100v=40</authorImage></item><item><title><![CDATA[The Strategic Impact of Customer Identity on Business Growth]]></title><description><![CDATA[Understanding and leveraging customer identity is crucial for driving business growth in today's competitive market. By personalizing customer experiences and utilizing data effectively, businesses can meet customer expectations and achieve substantial growth.]]></description><link>https://www.loginradius.com/blog/growth/customer-identity-drives-business-growth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-identity-drives-business-growth/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Wed, 03 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4e79da4659562d2a65120cace5ccc3c/7f8e9/business-growth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Understanding and leveraging customer identity is crucial for driving business growth in today&apos;s competitive market. By personalizing customer experiences and utilizing data effectively, businesses can meet customer expectations and achieve substantial growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-identity-drives-business-growth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[Gearing Up for Better Customer Experiences? Choose No-Code Identity Orchestration]]></title><description><![CDATA[In today’s digital landscape, enhancing customer experience is crucial for business success. No-code identity orchestration offers a powerful solution to streamline user authentication, improve security, and personalize interactions without extensive coding. Discover how this technology can transform your CX strategy, offering speed, cost-efficiency, and innovation. Read on to explore its benefits and implementation tips.]]></description><link>https://www.loginradius.com/blog/identity/no-code-identity-orchestration-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/no-code-identity-orchestration-cx/</guid><category><![CDATA[identity orchestration]]></category><category><![CDATA[login authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Mon, 01 Jul 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/23fdc8f573e1baabddddd7f2f76843bc/7f8e9/no-code-id-orchestration.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today’s digital landscape, enhancing customer experience is crucial for business success. No-code identity orchestration offers a powerful solution to streamline user authentication, improve security, and personalize interactions without extensive coding. Discover how this technology can transform your CX strategy, offering speed, cost-efficiency, and innovation. Read on to explore its benefits and implementation tips. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/no-code-identity-orchestration-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[How to Leverage Advanced Customer Identity Resolution for Better Marketing Outcomes]]></title><description><![CDATA[In the digital marketing landscape, understanding your customers is crucial for driving exceptional results. Advanced customer identity resolution unifies disparate data points to create comprehensive customer profiles. This enables personalized experiences, precise targeting, and higher ROI. Explore the power and implementation of this technology to enhance your marketing strategy.]]></description><link>https://www.loginradius.com/blog/growth/customer-identity-resolution-marketing-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-identity-resolution-marketing-success/</guid><category><![CDATA[identity resolution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Thu, 27 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/39b926536a8721e54f1a984a941131e1/7f8e9/customer-id-res.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the digital marketing landscape, understanding your customers is crucial for driving exceptional results. Advanced customer identity resolution unifies disparate data points to create comprehensive customer profiles. This enables personalized experiences, precise targeting, and higher ROI. Explore the power and implementation of this technology to enhance your marketing strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-identity-resolution-marketing-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Launches PassKeys to  Redefine Authentication Security and User Experience]]></title><description><![CDATA[Passwords pose significant security risks and inconvenience for users. Passkeys by LoginRadius is a revolutionary authentication mechanism offering a secure, passwordless process that enhances security and simplifies the user experience. Learn how Passkeys revolutionize customer authentication with easy integration and robust features.]]></description><link>https://www.loginradius.com/blog/identity/passkeys-online-authentication-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passkeys-online-authentication-experience/</guid><category><![CDATA[industry news]]></category><category><![CDATA[passkeys]]></category><category><![CDATA[passwordless login]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 26 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6753d918a8febe930efe2ceaebbddb3b/7f8e9/passkeys.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Passwords pose significant security risks and inconvenience for users. Passkeys by LoginRadius is a revolutionary authentication mechanism offering a secure, passwordless process that enhances security and simplifies the user experience. Learn how Passkeys revolutionize customer authentication with easy integration and robust features. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passkeys-online-authentication-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Decoding the Rise of Zero-Trust Adoption in Government Sector]]></title><description><![CDATA[As cyber threats become increasingly sophisticated, government sectors turn to Zero-Trust architecture to revolutionize their cybersecurity measures. This strategy is crucial for safeguarding sensitive information and maintaining national security.]]></description><link>https://www.loginradius.com/blog/identity/zero-trust-cybersecurity-government-sector/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/zero-trust-cybersecurity-government-sector/</guid><category><![CDATA[zero-trust security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 24 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/34b09ce51d5f7faf98f082adf903cb62/7f8e9/govt-sector.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As cyber threats become increasingly sophisticated, government sectors turn to Zero-Trust architecture to revolutionize their cybersecurity measures. This strategy is crucial for safeguarding sensitive information and maintaining national security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/zero-trust-cybersecurity-government-sector/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Say Goodbye to Passwords: How Passkeys Are Reinventing Online Security]]></title><description><![CDATA[Explore how passkeys are revolutionizing online security, replacing passwords with advanced cryptographic keys, and strengthening Multi-Factor Authentication (MFA). Say goodbye to passwords and embrace a secure digital future.]]></description><link>https://www.loginradius.com/blog/identity/online-security-passkeys/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/online-security-passkeys/</guid><category><![CDATA[online security]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 20 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d6c965453f2c982f264199ffeb3c8ad5/7f8e9/passkey.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore how passkeys are revolutionizing online security, replacing passwords with advanced cryptographic keys, and strengthening Multi-Factor Authentication (MFA). Say goodbye to passwords and embrace a secure digital future. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/online-security-passkeys/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Unveils the Future of Authentication with Push Notification MFA]]></title><description><![CDATA[LoginRadius introduces Push Notification Multi-Factor Authentication (MFA) to enhance digital security and provide a seamless customer authentication experience. This new feature addresses traditional password vulnerabilities intuitively and is user-friendly, ensuring robust security without compromising convenience.]]></description><link>https://www.loginradius.com/blog/identity/lr-push-notification-mfa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/lr-push-notification-mfa/</guid><category><![CDATA[industry news]]></category><category><![CDATA[MFA]]></category><category><![CDATA[digital security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 19 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4a15c6be9cb1bc1bf9819774598a0632/7f8e9/Push-Notification-MFA.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius introduces Push Notification Multi-Factor Authentication (MFA) to enhance digital security and provide a seamless customer authentication experience. This new feature addresses traditional password vulnerabilities intuitively and is user-friendly, ensuring robust security without compromising convenience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/lr-push-notification-mfa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius' Commitment to Responsible Disclosure For Customer Security]]></title><description><![CDATA[In today's digital landscape, security threats are ever-evolving, posing significant risks to businesses and their customers. At LoginRadius, we recognize the critical importance of staying ahead of these threats. Our commitment to proactive security measures and responsible disclosure is a testament to our dedication to safeguarding our clients' data and enhancing their overall security posture.]]></description><link>https://www.loginradius.com/blog/growth/lr-commitment-customer-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/lr-commitment-customer-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 13 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/be7c91a04c62579bb53906ca436eaf01/7f8e9/customer-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s digital landscape, security threats are ever-evolving, posing significant risks to businesses and their customers. At LoginRadius, we recognize the critical importance of staying ahead of these threats. Our commitment to proactive security measures and responsible disclosure is a testament to our dedication to safeguarding our clients&apos; data and enhancing their overall security posture. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/lr-commitment-customer-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Is Your CIAM Adapting to Global Needs? 6 Key Areas to Win Privacy-Concerned Customers]]></title><description><![CDATA[In today's data-driven world, adapting your Customer Identity and Access Management (CIAM) system to meet global privacy needs is essential. Explore six key areas to ensure your CIAM solution remains compliant, secure, and user-friendly, building trust with privacy-conscious customers. From implementing enhanced security measures to offering user-centric privacy controls, learn how to stay ahead in a market where data privacy is paramount.]]></description><link>https://www.loginradius.com/blog/identity/ciam-business-privacy-users/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-business-privacy-users/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 11 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f02a5e77269e3a79c871d697ad18d9f0/7f8e9/ciam-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s data-driven world, adapting your Customer Identity and Access Management (CIAM) system to meet global privacy needs is essential. Explore six key areas to ensure your CIAM solution remains compliant, secure, and user-friendly, building trust with privacy-conscious customers. From implementing enhanced security measures to offering user-centric privacy controls, learn how to stay ahead in a market where data privacy is paramount. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-business-privacy-users/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations?]]></title><description><![CDATA[Cybersecurity is crucial for safeguarding digital trade in the interconnected digital economy. This article explores how identity security, supported by robust Customer Identity Management (CIAM) solutions, can unify global digital trade negotiations by building trust and establishing common security standards.]]></description><link>https://www.loginradius.com/blog/growth/identity-security-digital-trade/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-security-digital-trade/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam solutions]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Wed, 05 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a85dc459bb7b094521a731096a6382e2/7f8e9/identity-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybersecurity is crucial for safeguarding digital trade in the interconnected digital economy. This article explores how identity security, supported by robust Customer Identity Management (CIAM) solutions, can unify global digital trade negotiations by building trust and establishing common security standards. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-security-digital-trade/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[The Growing Threat of Identity-Based Attacks and the Need for an Advanced Identity Security Approach]]></title><description><![CDATA[Identity-based attacks are escalating, targeting personal data and business secrets with unprecedented sophistication. Traditional security measures fall short; a new approach is essential. Explore advanced identity security strategies like Zero Trust, MFA, CIAM, and behavioral analytics to safeguard against these evolving threats.]]></description><link>https://www.loginradius.com/blog/identity/advanced-identity-security-based-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/advanced-identity-security-based-attacks/</guid><category><![CDATA[identity security]]></category><category><![CDATA[zero trust security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 05 Jun 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/766ea9e4b2d11f5668a0947f67ef1919/7f8e9/identity-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity-based attacks are escalating, targeting personal data and business secrets with unprecedented sophistication. Traditional security measures fall short; a new approach is essential. Explore advanced identity security strategies like Zero Trust, MFA, CIAM, and behavioral analytics to safeguard against these evolving threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/advanced-identity-security-based-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Implement OpenID Connect (OIDC) SSO with LoginRadius?]]></title><description><![CDATA[In this tutorial, you will learn how to implement Single Sign-On (SSO) using OpenID Connect (OIDC) with LoginRadius as your Identity Provider.]]></description><link>https://www.loginradius.com/blog/engineering/implementing-oidc-sso-loginradius-as-identity-provider/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/implementing-oidc-sso-loginradius-as-identity-provider/</guid><category><![CDATA[SSO]]></category><category><![CDATA[OIDC]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Sanjay Velu]]></dc:creator><pubDate>Thu, 30 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/185a654052323b1a8fd3b9ee7f274ad3/58556/implementing-oidc-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, you will learn how to implement Single Sign-On (SSO) using OpenID Connect (OIDC) with LoginRadius as your Identity Provider. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/implementing-oidc-sso-loginradius-as-identity-provider/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/SanjayV0.png?size=100v=40</authorImage></item><item><title><![CDATA[Testing Brute-force Lockout with LoginRadius]]></title><description><![CDATA[In this blog, you'll learn about brute-force lockout, the creation of a basic app using Identity Experience Framework, and how to unlock a user account using APIs.]]></description><link>https://www.loginradius.com/blog/engineering/bruteforce-lock-and-unlock/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/bruteforce-lock-and-unlock/</guid><category><![CDATA[Brute-force]]></category><category><![CDATA[LoginRadius]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Gayathri Suresh]]></dc:creator><pubDate>Wed, 29 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/868ffd6ee6f1dcdc0618db2afa053099/58556/implementing-brute-force-lockout.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, you&apos;ll learn about brute-force lockout, the creation of a basic app using Identity Experience Framework, and how to unlock a user account using APIs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/bruteforce-lock-and-unlock/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/gayathrisuresh150501.png?size=100v=40</authorImage></item><item><title><![CDATA[Unlocking the Secret to Dominating the Market: How Can Give You a Competitive Edge]]></title><description><![CDATA[Identity convergence integrates diverse customer data into unified profiles, enabling unmatched personalization and efficiency. Learn how to leverage this strategy for superior business outcomes and gain a competitive edge in today's market.]]></description><link>https://www.loginradius.com/blog/growth/identity-convergence-market-dominance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-convergence-market-dominance/</guid><category><![CDATA[identity convergence]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Thu, 23 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20efd527155b3284b160bcaecfc6a293/7f8e9/identity-convergence.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity convergence integrates diverse customer data into unified profiles, enabling unmatched personalization and efficiency. Learn how to leverage this strategy for superior business outcomes and gain a competitive edge in today&apos;s market. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-convergence-market-dominance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[How AI Is Changing the Game in User Authentication]]></title><description><![CDATA[This blog explores how AI can revolutionize authentication, from addressing the limitations of traditional methods to utilizing innovative techniques that use machine learning algorithms.]]></description><link>https://www.loginradius.com/blog/identity/ai-revolutionizing-user-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ai-revolutionizing-user-authentication/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[artificial intelligence]]></category><dc:creator><![CDATA[Maya Kirianova]]></dc:creator><pubDate>Thu, 23 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dc00b268ea981882283ed20a1e383fcd/7f8e9/artificial-intelligence.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This blog explores how AI can revolutionize authentication, from addressing the limitations of traditional methods to utilizing innovative techniques that use machine learning algorithms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ai-revolutionizing-user-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Maya Kirianova&amp;size=100</authorImage></item><item><title><![CDATA[eIDAS 2.0: The Digital Revolution Is Here – Is Your Business Ready to Comply?]]></title><description><![CDATA[Explore the impact of eIDAS 2.0 on business operations within the EU. Learn how to leverage this regulatory update to enhance security, streamline cross-border access, and expand service accessibility for a successful digital transformation.]]></description><link>https://www.loginradius.com/blog/identity/eidas-2-0-digital-revolution-transformation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/eidas-2-0-digital-revolution-transformation/</guid><category><![CDATA[digital revolution]]></category><category><![CDATA[consent management]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 21 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56b3e83c5c8c37329adaef7b55f41535/7f8e9/digital-transformation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the impact of eIDAS 2.0 on business operations within the EU. Learn how to leverage this regulatory update to enhance security, streamline cross-border access, and expand service accessibility for a successful digital transformation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/eidas-2-0-digital-revolution-transformation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Strengthening Your Business Security: 7 Key User Access Management Best Practices]]></title><description><![CDATA[Strengthen your business security with proven user access management strategies. Discover how role-based access control, regular permission reviews, and strong password policies can safeguard your sensitive data and ensure compliance with regulations.]]></description><link>https://www.loginradius.com/blog/growth/user-access-management-business-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/user-access-management-business-security/</guid><category><![CDATA[user access management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 14 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5fa6bc48100874ff9e36f37356ada328/7f8e9/user-access-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Strengthen your business security with proven user access management strategies. Discover how role-based access control, regular permission reviews, and strong password policies can safeguard your sensitive data and ensure compliance with regulations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/user-access-management-business-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Quick Guide To Choosing The Right Zero Trust Vendor]]></title><description><![CDATA[Zero-trust security is imperative in today's digital age. However, choosing the right platform provider can be daunting. Our guide explores crucial factors like security features, scalability, and compliance, empowering you to make the best decision for your organization's cybersecurity needs.]]></description><link>https://www.loginradius.com/blog/identity/choosing-right-zero-trust-vendor/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/choosing-right-zero-trust-vendor/</guid><category><![CDATA[zero trust security]]></category><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 07 May 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/090116c0462f13651fdedcde8b178cdf/7f8e9/right-zero-trust-vendor.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Zero-trust security is imperative in today&apos;s digital age. However, choosing the right platform provider can be daunting. Our guide explores crucial factors like security features, scalability, and compliance, empowering you to make the best decision for your organization&apos;s cybersecurity needs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/choosing-right-zero-trust-vendor/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Navigating the Shifting Landscape of Data Privacy Regulations: Embracing Core Marketing Principles]]></title><description><![CDATA[In today's digital business landscape, navigating data privacy regulations is paramount. Discover how businesses worldwide are adapting to safeguard user data privacy while embracing transparency and responsible personalization. Explore the importance of empowering users through choice and accountability in the ever-evolving regulatory landscape.]]></description><link>https://www.loginradius.com/blog/growth/data-privacy-marketing-regulations/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/data-privacy-marketing-regulations/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Tue, 30 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e16a30ebeec7f11c046db810c1d960f3/7f8e9/data-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s digital business landscape, navigating data privacy regulations is paramount. Discover how businesses worldwide are adapting to safeguard user data privacy while embracing transparency and responsible personalization. Explore the importance of empowering users through choice and accountability in the ever-evolving regulatory landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/data-privacy-marketing-regulations/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[Cloud Security Governance: Protecting Assets in the Digital Frontier]]></title><description><![CDATA[Discover the significance of cloud security governance in safeguarding digital assets as businesses transition to cloud computing. Delve into the best practices and challenges organizations face to ensure data security and compliance in the ever-evolving digital frontier.]]></description><link>https://www.loginradius.com/blog/identity/cloud-security-governance-digital-protection/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cloud-security-governance-digital-protection/</guid><category><![CDATA[cloud security]]></category><category><![CDATA[data governance]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Tue, 30 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f721efc8b15a5c4b1503b9d75921d23d/7f8e9/cloud-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the significance of cloud security governance in safeguarding digital assets as businesses transition to cloud computing. Delve into the best practices and challenges organizations face to ensure data security and compliance in the ever-evolving digital frontier. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cloud-security-governance-digital-protection/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[What is Silver SAML Vulnerability and How Can We Protect Our Digital Identities?]]></title><description><![CDATA[This blog explores the Silver SAML vulnerability and its significance in protecting digital identities. From SAML basics to mitigation tactics, it provides essential insights for safeguarding against cyber threats.]]></description><link>https://www.loginradius.com/blog/identity/silver-saml-digital-identity-protection/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/silver-saml-digital-identity-protection/</guid><category><![CDATA[saml]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Mon, 29 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6bf60cd8bafe0de447d4efd5af31f0db/7f8e9/silver-saml.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This blog explores the Silver SAML vulnerability and its significance in protecting digital identities. From SAML basics to mitigation tactics, it provides essential insights for safeguarding against cyber threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/silver-saml-digital-identity-protection/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Transforming Customer Experience: Enhancing CX through CIAM and Insights]]></title><description><![CDATA[Learn how to elevate your CX strategies with CIAM and data-driven insights. From seamless digital experiences to proactive customer engagement, discover the key to driving growth and loyalty in a competitive market.]]></description><link>https://www.loginradius.com/blog/growth/enhancing-ciam-customer-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/enhancing-ciam-customer-experience/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 25 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1d3ac44e09c05a5fbb8a3826fddae588/7f8e9/customer-experience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to elevate your CX strategies with CIAM and data-driven insights. From seamless digital experiences to proactive customer engagement, discover the key to driving growth and loyalty in a competitive market. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/enhancing-ciam-customer-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Identity Security for Device Trust: Navigating 2024 & Beyond]]></title><description><![CDATA[In the rapidly evolving technology landscape, where our devices have become indispensable extensions of ourselves, ensuring their trustworthiness is paramount. Enter identity security for device trust, a concept that gained unprecedented significance in 2024 and is set to shape the future of cybersecurity. Let’s uncover the intricacies of this crucial topic, exploring its importance, challenges, and the path forward as we navigate the digital landscape of 2024 and beyond.]]></description><link>https://www.loginradius.com/blog/identity/identity-security-device-trust-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-security-device-trust-2024/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 18 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/343657e12cdc66431952080e5dcb9657/7f8e9/identity-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the rapidly evolving technology landscape, where our devices have become indispensable extensions of ourselves, ensuring their trustworthiness is paramount. Enter identity security for device trust, a concept that gained unprecedented significance in 2024 and is set to shape the future of cybersecurity. Let’s uncover the intricacies of this crucial topic, exploring its importance, challenges, and the path forward as we navigate the digital landscape of 2024 and beyond. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-security-device-trust-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[The Power Of Consent Marketing- A Deep Dive Into Its Endless Advantages]]></title><description><![CDATA[Discover the pivotal role of consent marketing in today's digital landscape. Explore how it goes beyond legal compliance to build trust, enhance targeting, ensure legal compliance, and foster long-term customer relationships.]]></description><link>https://www.loginradius.com/blog/growth/consent-management-business-advantages/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consent-management-business-advantages/</guid><category><![CDATA[consent management]]></category><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 16 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c2e2f377e28557dace7b0aa8a7a25279/7f8e9/power-consent-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the pivotal role of consent marketing in today&apos;s digital landscape. Explore how it goes beyond legal compliance to build trust, enhance targeting, ensure legal compliance, and foster long-term customer relationships. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consent-management-business-advantages/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Securing B2B SaaS: How Identity Management Leads the Charge Against Top 5 Security Challenges]]></title><description><![CDATA[Security is paramount in the dynamic B2B SaaS landscape. Explore how Identity Management addresses the top 5 security challenges, from data breaches to compliance, offering insights to fortify digital defenses. Discover proactive measures to safeguard systems and data, letting Identity Management lead the charge in securing the future of B2B SaaS.]]></description><link>https://www.loginradius.com/blog/growth/b2b-saas-security-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/b2b-saas-security-management/</guid><category><![CDATA[saas]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 12 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b933b12c425ee250a03bc303e208abbc/7f8e9/b2b-saas.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security is paramount in the dynamic B2B SaaS landscape. Explore how Identity Management addresses the top 5 security challenges, from data breaches to compliance, offering insights to fortify digital defenses. Discover proactive measures to safeguard systems and data, letting Identity Management lead the charge in securing the future of B2B SaaS. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/b2b-saas-security-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[The Power of Behavioral Biometric Authentication in Enhancing Security and CX Synergy]]></title><description><![CDATA[Explore the innovative world of behavioral biometric authentication and its role in fortifying security and enhancing customer experience (CX). This cutting-edge method analyzes unique behavioral patterns to verify identities, offering a seamless user experience.]]></description><link>https://www.loginradius.com/blog/growth/biometric-authentication-security-cx-balance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/biometric-authentication-security-cx-balance/</guid><category><![CDATA[biometric authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 05 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8e38af0c5c5ab95bf1d81b6f9e6785a/7f8e9/biometric-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the innovative world of behavioral biometric authentication and its role in fortifying security and enhancing customer experience (CX). This cutting-edge method analyzes unique behavioral patterns to verify identities, offering a seamless user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/biometric-authentication-security-cx-balance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Exciting Leadership Updates Amid Strategic Growth at LoginRadius]]></title><description><![CDATA[Embarking on this transformative journey goes beyond leadership shifts—it's a renewal of our commitment to excellence, innovation, and the unwavering pursuit of success. We are excited about the opportunities that lie ahead.]]></description><link>https://www.loginradius.com/blog/identity/leadership-updates-lr/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/leadership-updates-lr/</guid><category><![CDATA[leadership updates]]></category><category><![CDATA[new beginnings]]></category><dc:creator><![CDATA[Ajoy Anand]]></dc:creator><pubDate>Tue, 02 Apr 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/527319cf49ab434dd9a9de25e6588533/7f8e9/lr-updates.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Embarking on this transformative journey goes beyond leadership shifts—it&apos;s a renewal of our commitment to excellence, innovation, and the unwavering pursuit of success. We are excited about the opportunities that lie ahead. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/leadership-updates-lr/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ajoy Anand&amp;size=100</authorImage></item><item><title><![CDATA[Enhancing Customer Retention with Magic Links: A User-Friendly Approach to Authentication]]></title><description><![CDATA[Discover the magic of Magic Links, a frictionless authentication method that simplifies login. Easily enhance security and boost customer retention. Say goodbye to password woes and 2FA complexity. Learn how to implement Magic Links for a seamless user experience.]]></description><link>https://www.loginradius.com/blog/growth/customer-retention-magic-links/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-retention-magic-links/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[customer retention]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Thu, 28 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ec2be4db5ed90ac14f6aba142752486b/7f8e9/customer-retention.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the magic of Magic Links, a frictionless authentication method that simplifies login. Easily enhance security and boost customer retention. Say goodbye to password woes and 2FA complexity. Learn how to implement Magic Links for a seamless user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-retention-magic-links/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[From Past to Present: User Authentication's Evolution and Challenges]]></title><description><![CDATA[From the humble beginnings of legacy authentication mechanisms to today's sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation.]]></description><link>https://www.loginradius.com/blog/identity/user-authentication-evolution-challenges/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/user-authentication-evolution-challenges/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam solutions]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d5f19e8c40bf2569a34d783a37137695/922fd/user-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; From the humble beginnings of legacy authentication mechanisms to today&apos;s sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/user-authentication-evolution-challenges/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Strategic Insights: Leveraging Data Privacy for Marketers' Success]]></title><description><![CDATA[Data has become invaluable in digital marketing. However, amidst the quest for personalization, data privacy often takes a back seat. Explore how a strategic approach to data privacy can ensure compliance, build trust, and drive long-term success for marketers. Discover the importance of transparency and ethical data practices and how prioritizing privacy can set brands apart in a crowded marketplace.]]></description><link>https://www.loginradius.com/blog/growth/data-privacy-boost-marketing-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/data-privacy-boost-marketing-success/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 20 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1f485d66402984a3b7746c1f122482d8/7f8e9/marketing-success.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Data has become invaluable in digital marketing. However, amidst the quest for personalization, data privacy often takes a back seat. Explore how a strategic approach to data privacy can ensure compliance, build trust, and drive long-term success for marketers. Discover the importance of transparency and ethical data practices and how prioritizing privacy can set brands apart in a crowded marketplace. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/data-privacy-boost-marketing-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Recognized as the Top Customer IAM Platform of 2024 by CIOReview]]></title><description><![CDATA[CIOReview, a leading US magazine, recently recognized LoginRadius as the top customer IAM platform of 2024 in its latest publication. Discover how LoginRadius secured its position as the premier customer IAM, offering unparalleled scalability, performance, and security to ensure a seamless and reliable user experience.]]></description><link>https://www.loginradius.com/blog/growth/lr-top-ciam-platform-cio-review/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/lr-top-ciam-platform-cio-review/</guid><category><![CDATA[ciam platform]]></category><category><![CDATA[coverage]]></category><category><![CDATA[cio review]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 18 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6b9806b8fd12765ad46b206903aae87d/922fd/cio-review-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIOReview, a leading US magazine, recently recognized LoginRadius as the top customer IAM platform of 2024 in its latest publication. Discover how LoginRadius secured its position as the premier customer IAM, offering unparalleled scalability, performance, and security to ensure a seamless and reliable user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/lr-top-ciam-platform-cio-review/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Does Multi-Tenancy in Customer IAM Solutions Boost Security?]]></title><description><![CDATA[Multi-tenancy in Customer IAM architecture introduces a significant shift in how organizations manage and protect their users' identities in a shared environment. Let's discover how multi-tenancy enables multiple tenants or customers to co-exist securely within a single CIAM infrastructure.]]></description><link>https://www.loginradius.com/blog/identity/multi-tenancy-ciam-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/multi-tenancy-ciam-security/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 14 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/69d7065d03b298dc72f0fe9b6fcd17ad/7f8e9/ciam-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Multi-tenancy in Customer IAM architecture introduces a significant shift in how organizations manage and protect their users&apos; identities in a shared environment. Let&apos;s discover how multi-tenancy enables multiple tenants or customers to co-exist securely within a single CIAM infrastructure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/multi-tenancy-ciam-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[SSO for SaaS Business: The Key to Boost Sales For Enterprises]]></title><description><![CDATA[Explore the impact of Single Sign-On (SSO) on SaaS businesses, from enhancing user experiences to improving sales performance. Discover the benefits of SSO and how LoginRadius stands out as a reliable solution for enterprises seeking a competitive edge.]]></description><link>https://www.loginradius.com/blog/growth/sso-saas-business-sales/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/sso-saas-business-sales/</guid><category><![CDATA[saas]]></category><category><![CDATA[sso]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 07 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/612495c7e6751919e201f55d305d456c/7f8e9/business-sales.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the impact of Single Sign-On (SSO) on SaaS businesses, from enhancing user experiences to improving sales performance. Discover the benefits of SSO and how LoginRadius stands out as a reliable solution for enterprises seeking a competitive edge. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/sso-saas-business-sales/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How No/Low Code CIAM Balances Security and User Engagement?]]></title><description><![CDATA[Discover the revolutionary No/Low Code CIAM world, where robust security meets seamless user engagement. Learn why developers are turning to this solution, explore real-world use cases, and see how LoginRadius is leading the way in transforming digital identity management.]]></description><link>https://www.loginradius.com/blog/identity/low-code-ciam-user-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/low-code-ciam-user-experience/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 07 Mar 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f41e356f8a346ee64dae9a074e5f26f6/7f8e9/no-code-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the revolutionary No/Low Code CIAM world, where robust security meets seamless user engagement. Learn why developers are turning to this solution, explore real-world use cases, and see how LoginRadius is leading the way in transforming digital identity management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/low-code-ciam-user-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How do CDP and CIAM Help Marketers in Cookieless Marketing?]]></title><description><![CDATA[Gone are the days when marketing strategy included collecting and using third-party cookies to target consumers. In today’s era, consumers are calling the shots to control their privacy, leading to a big change in how marketers manage customer data. While the concept evolved into reality, how can marketers move forward? Stay tuned as we explore how CDP and CIAM help marketers thrive in cookieless marketing.]]></description><link>https://www.loginradius.com/blog/growth/cdp-ciam-cookieless-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/cdp-ciam-cookieless-marketing/</guid><category><![CDATA[customer data platform]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 20 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2099179425decb2cae1793d5d62253e9/7f8e9/customer-data-platform.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Gone are the days when marketing strategy included collecting and using third-party cookies to target consumers. In today’s era, consumers are calling the shots to control their privacy, leading to a big change in how marketers manage customer data. While the concept evolved into reality, how can marketers move forward? Stay tuned as we explore how CDP and CIAM help marketers thrive in cookieless marketing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/cdp-ciam-cookieless-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How is CIAM Solution a Critical Part of DNBs’ Digital Transformation Strategy?]]></title><description><![CDATA[Customer Identity and Access Management is about keeping customer data safe and giving them the proper access to things online. In today's interconnected era, digital native businesses must help them stay nimble and grow with evolving times. Let's explore the indispensable role of CIAM solutions in digital companies more!]]></description><link>https://www.loginradius.com/blog/growth/ciam-solution-digital-native-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-solution-digital-native-business/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 16 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4b00c6e1d3285bd8d2d827b2e473d7fa/7f8e9/ciam-dig-transformation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customer Identity and Access Management is about keeping customer data safe and giving them the proper access to things online. In today&apos;s interconnected era, digital native businesses must help them stay nimble and grow with evolving times. Let&apos;s explore the indispensable role of CIAM solutions in digital companies more! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-solution-digital-native-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Beyond Passwords: Navigating Tomorrow's Authentication Landscape]]></title><description><![CDATA[Dive into the future of authentication with our insightful exploration of passwordless technology. Learn why users are abandoning passwords, how passwordless authentication ensures compliance, and why LoginRadius is the top choice for a secure and frictionless authentication experience.]]></description><link>https://www.loginradius.com/blog/identity/passwordless-login-future-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passwordless-login-future-authentication/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 15 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/54f802c8ab2b0046f1c39d328db9c7a6/7f8e9/passswordless-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the future of authentication with our insightful exploration of passwordless technology. Learn why users are abandoning passwords, how passwordless authentication ensures compliance, and why LoginRadius is the top choice for a secure and frictionless authentication experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passwordless-login-future-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How does identity management address the top 5 security challenges in B2B SaaS?]]></title><description><![CDATA[As the usage and adoption of B2B SaaS applications are growing, businesses need to find a robust solution to overcome the associated security concerns. Presenting IAM or Identity Access Management, a world-class solution to create a secure digital experience for your business partners.]]></description><link>https://www.loginradius.com/blog/identity/b2b-saas-security-challenges-iam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/b2b-saas-security-challenges-iam/</guid><category><![CDATA[b2b]]></category><category><![CDATA[saas]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 12 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c173393f45fcc5a5e6e5681b8ead2805/7f8e9/b2bsaas.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As the usage and adoption of B2B SaaS applications are growing, businesses need to find a robust solution to overcome the associated security concerns. Presenting IAM or Identity Access Management, a world-class solution to create a secure digital experience for your business partners. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/b2b-saas-security-challenges-iam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Reinforcing Security with Advanced Risk-Based Authentication in 2024 & Beyond]]></title><description><![CDATA[Explore the significance of Risk-Based Authentication (RBA) in today's digital landscape, where robust security measures are essential. Learn how RBA adds an extra layer of defense against sophisticated cyber threats, shields against modern attack vectors, and enhances security in high-risk situations.]]></description><link>https://www.loginradius.com/blog/identity/advanced-risk-based-authentication-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/advanced-risk-based-authentication-2024/</guid><category><![CDATA[risk based authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 08 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/728b0dbc9a453bf808b1a11efb8056dd/7f8e9/rba.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the significance of Risk-Based Authentication (RBA) in today&apos;s digital landscape, where robust security measures are essential. Learn how RBA adds an extra layer of defense against sophisticated cyber threats, shields against modern attack vectors, and enhances security in high-risk situations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/advanced-risk-based-authentication-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[2FA vs MFA: Understanding the Differences]]></title><description><![CDATA[Unsure whether your business needs 2FA or MFA? Explore their key differences, benefits, and practical use cases. Plus, learn how LoginRadius’ Adaptive MFA can intelligently protect your business.]]></description><link>https://www.loginradius.com/blog/identity/2fa-mfa-key-differences/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/2fa-mfa-key-differences/</guid><category><![CDATA[Identity Management]]></category><category><![CDATA[Data Privacy]]></category><category><![CDATA[User Authentication]]></category><category><![CDATA[MFA]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 06 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ea4892b335d436fcf48fc28931f11794/58556/2fa-mfa-key-differences.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unsure whether your business needs 2FA or MFA? Explore their key differences, benefits, and practical use cases. Plus, learn how LoginRadius’ Adaptive MFA can intelligently protect your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/2fa-mfa-key-differences/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Okta Token Theft Implicated in Cloudflare's Security Breach]]></title><description><![CDATA[Uncover the connection between the recent Cloudflare breach and stolen Okta authentication tokens. Discover Cloudflare's immediate actions and ongoing efforts to strengthen security measures.]]></description><link>https://www.loginradius.com/blog/identity/okta-token-theft-cloudflare-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/okta-token-theft-cloudflare-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 06 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c132c914150403353002714ac36acc3e/7f8e9/data-breach.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Uncover the connection between the recent Cloudflare breach and stolen Okta authentication tokens. Discover Cloudflare&apos;s immediate actions and ongoing efforts to strengthen security measures. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/okta-token-theft-cloudflare-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Voice OTP by LoginRadius: Revolutionizing Secure and Seamless User Authentication]]></title><description><![CDATA[Discover Voice OTP – LoginRadius' innovative solution for secure and seamless user authentication. Explore how Voice OTP is reshaping the digital authentication landscape from strategic integration to inclusivity and global reach.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-launches-voice-otp-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-launches-voice-otp-authentication/</guid><category><![CDATA[data security]]></category><category><![CDATA[user authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 01 Feb 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2d7570fffca13b020c2f6bb70240614f/7f8e9/voiceotp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover Voice OTP – LoginRadius&apos; innovative solution for secure and seamless user authentication. Explore how Voice OTP is reshaping the digital authentication landscape from strategic integration to inclusivity and global reach. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-launches-voice-otp-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Which is Safer: Biometric or Password?]]></title><description><![CDATA[The ongoing debate over the use of traditional passwords and biometric authentication underscores the evolving digital security landscape. While traditional password-based authentication is less expensive and ensures minimum friction during the consumer journey, biometric password authentication overcomes all the drawbacks of traditional passwords. Let’s understand more about the strategies to find out the optimal solution to biometric authentication vs password debate.]]></description><link>https://www.loginradius.com/blog/identity/biometric-vs-password-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/biometric-vs-password-authentication/</guid><category><![CDATA[biometric authentication]]></category><category><![CDATA[password authentication]]></category><category><![CDATA[data privacy]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 31 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/be6ba8ee8e22eeb2595320974c2d8553/7f8e9/biometric-vs-password.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The ongoing debate over the use of traditional passwords and biometric authentication underscores the evolving digital security landscape. While traditional password-based authentication is less expensive and ensures minimum friction during the consumer journey, biometric password authentication overcomes all the drawbacks of traditional passwords. Let’s understand more about the strategies to find out the optimal solution to biometric authentication vs password debate. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/biometric-vs-password-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Reasons to Use Biometric Authentication for Multi-Factor Authentication]]></title><description><![CDATA[Gone are the days when businesses used to rely on usernames, passwords, and OTPs to provide a secure and seamless user experience. Businesses are shifting to modern and advanced authentication methods, like multi-factor authorization (MFA), which is a crucial part of ensuring security. MFA comprises different authentication factors, but why is biometric authentication one of the secure options? Let’s find out!]]></description><link>https://www.loginradius.com/blog/identity/biometric-multi-factor-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/biometric-multi-factor-authentication/</guid><category><![CDATA[biometric authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 30 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4e9239c817cb7bf9dc050905b3646ff/7f8e9/biometric-auth-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Gone are the days when businesses used to rely on usernames, passwords, and OTPs to provide a secure and seamless user experience. Businesses are shifting to modern and advanced authentication methods, like multi-factor authorization (MFA), which is a crucial part of ensuring security. MFA comprises different authentication factors, but why is biometric authentication one of the secure options? Let’s find out! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/biometric-multi-factor-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Exploring Digital Identity Verification with Effective Crucial Data Checks]]></title><description><![CDATA[Ensuring the integrity of digital identities has become businesses' topmost concern in this rapidly evolving world. With every business, especially banking and finance, providing digital services for the customer’s convenience, how do they ensure they have the right person? Well, this blog delves into the intricacies of digital identity verification and how it can benefit businesses struggling with the same situation.]]></description><link>https://www.loginradius.com/blog/identity/digital-identity-verification/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-identity-verification/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 30 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dec5b3833fecaa9afddec244bf7a34e9/7f8e9/dig-identity-verification.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Ensuring the integrity of digital identities has become businesses&apos; topmost concern in this rapidly evolving world. With every business, especially banking and finance, providing digital services for the customer’s convenience, how do they ensure they have the right person? Well, this blog delves into the intricacies of digital identity verification and how it can benefit businesses struggling with the same situation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-identity-verification/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Reasons Why LoginRadius Leads the Way in the CIAM Landscape in 2024 & Beyond]]></title><description><![CDATA[Discover how LoginRadius’ cutting-edge CIAM solution seamlessly integrates state-of-the-art technology for robust security and unparalleled user experiences, making it the go-to choice for businesses navigating the digital terrain.]]></description><link>https://www.loginradius.com/blog/identity/lr-leads-ciam-landscape-2024-beyond/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/lr-leads-ciam-landscape-2024-beyond/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/99758400e2b95f1d6cf7c15f9b80f888/7f8e9/ciam-lead-2024.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover how LoginRadius’ cutting-edge CIAM solution seamlessly integrates state-of-the-art technology for robust security and unparalleled user experiences, making it the go-to choice for businesses navigating the digital terrain. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/lr-leads-ciam-landscape-2024-beyond/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Seizing Opportunities: How Can Marketers Leverage Data Privacy for Success]]></title><description><![CDATA[Data privacy is one of the most essential aspects of data security. With stringent data privacy laws all around the world, marketers are finding it challenging to navigate through this new framework. Let’s discuss how data privacy laws for marketers are actually beneficial.]]></description><link>https://www.loginradius.com/blog/growth/data-privacy-marketers-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/data-privacy-marketers-success/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 16 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b85c892e674d029454e31d8d9df4eaeb/7f8e9/data-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Data privacy is one of the most essential aspects of data security. With stringent data privacy laws all around the world, marketers are finding it challenging to navigate through this new framework. Let’s discuss how data privacy laws for marketers are actually beneficial. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/data-privacy-marketers-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Above the Horizon: Exploring the Power of a Strong Cloud Identity Platform]]></title><description><![CDATA[Organizations are investing in scalable cloud platforms; however, safeguarding user identities and information becomes fundamental. As technology becomes advanced, there is a chance to identify the gaps. That’s where the cloud identity platform comes in to secure the platform and bridge the gap that could possibly lead the attacker into the cloud platform.]]></description><link>https://www.loginradius.com/blog/identity/cloud-identity-platform/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cloud-identity-platform/</guid><category><![CDATA[cloud identity]]></category><category><![CDATA[user authentication]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 12 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/268b07dcdd16061f0a76713d4c8c8fde/7f8e9/cloud-identity-platform.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Organizations are investing in scalable cloud platforms; however, safeguarding user identities and information becomes fundamental. As technology becomes advanced, there is a chance to identify the gaps. That’s where the cloud identity platform comes in to secure the platform and bridge the gap that could possibly lead the attacker into the cloud platform. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cloud-identity-platform/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Boosting Customеr Rеtеntion Ratеs With Stratеgiеs for Passwordlеss Authеntication]]></title><description><![CDATA[With the rise in cyber crimes, like phishing attacks, due to weak passwords and password reuse, passwordless authentication is the new way businesses can improve customer retention by providing a sense of security to users.]]></description><link>https://www.loginradius.com/blog/growth/passwordless-authentication-customer-retention/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/passwordless-authentication-customer-retention/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[customer retention]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 04 Jan 2024 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7ba381799daa00019a63021691f4edc8/7f8e9/customer-retntion.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the rise in cyber crimes, like phishing attacks, due to weak passwords and password reuse, passwordless authentication is the new way businesses can improve customer retention by providing a sense of security to users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/passwordless-authentication-customer-retention/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Streamlining Authentication: Elevate User Experience with LoginRadius AutoLookup]]></title><description><![CDATA[LoginRadius introduces AutoLookup IDP, a game-changer in the CIAM landscape. Simplify authentication, save time, and elevate user satisfaction. Explore the benefits of this innovative solution and step into the future of secure and efficient login experiences.]]></description><link>https://www.loginradius.com/blog/identity/lr-launches-autolookup-idp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/lr-launches-autolookup-idp/</guid><category><![CDATA[identity provider]]></category><category><![CDATA[user authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 21 Dec 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9563ca1ba4dac690650434805fbe8a17/c0524/autolookup-idp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius introduces AutoLookup IDP, a game-changer in the CIAM landscape. Simplify authentication, save time, and elevate user satisfaction. Explore the benefits of this innovative solution and step into the future of secure and efficient login experiences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/lr-launches-autolookup-idp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Journey Through Our Top 10 Blogs from 2023]]></title><description><![CDATA[Embark on a journey through our top 10 blogs from 2023, where we unravel the complexities of CIAM, explore security measures, and delve into growth strategies. Learn about the importance of multi-factor authentication, cloud tenancy nuances, and user management. These blogs provide indispensable insights to secure your business and drive substantial growth.]]></description><link>https://www.loginradius.com/blog/identity/top-10-blogs-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/top-10-blogs-2023/</guid><category><![CDATA[identity blogs]]></category><category><![CDATA[growth blogs]]></category><category><![CDATA[ciam solutions]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 20 Dec 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/17dc2d66f1410815d0a1c5d2b3d48769/7f8e9/top-blog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Embark on a journey through our top 10 blogs from 2023, where we unravel the complexities of CIAM, explore security measures, and delve into growth strategies. Learn about the importance of multi-factor authentication, cloud tenancy nuances, and user management. These blogs provide indispensable insights to secure your business and drive substantial growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/top-10-blogs-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Exploring Modern Identity: Unraveling Customer Attitudes]]></title><description><![CDATA[With the digital transformation, the expectations and behavior of modern customers are changing, desiring more seamlessness and convenience when managing their identities. A robust CIAM can help you meet customer expectations while reducing identity theft risk.]]></description><link>https://www.loginradius.com/blog/growth/modern-identity-customer-behavior/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/modern-identity-customer-behavior/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[passwordless authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 15 Dec 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f6f9370cd0ea201f0292f94fbf8c7747/922fd/customer-behaviour.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the digital transformation, the expectations and behavior of modern customers are changing, desiring more seamlessness and convenience when managing their identities. A robust CIAM can help you meet customer expectations while reducing identity theft risk. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/modern-identity-customer-behavior/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Now and Beyond- Staying Ahead with the 10 Key Cybersecurity Trends of 2024]]></title><description><![CDATA[Dive into the future of cybersecurity with the top 10 trends for 2024. From Gen AI Attacks to Quantum Computing Threats, fortify your defense and stay ahead in the digital landscape.]]></description><link>https://www.loginradius.com/blog/identity/cybersecurity-trends-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cybersecurity-trends-2024/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[MFA]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 07 Dec 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c72a1a9240563a8cf1ad9844fdb3f910/7f8e9/cybersecurity-trends.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the future of cybersecurity with the top 10 trends for 2024. From Gen AI Attacks to Quantum Computing Threats, fortify your defense and stay ahead in the digital landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cybersecurity-trends-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[B2B SaaS SSO Login: Exploring Enterprise Considerations in 2024]]></title><description><![CDATA[Discover the role of SSO login in B2B SaaS. This blog explores challenges, emerging trends, and crucial considerations for enterprises in 2024. From security measures to user-centric design, stay ahead in the dynamic realm of B2B SaaS.]]></description><link>https://www.loginradius.com/blog/identity/b2b-saas-sso-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/b2b-saas-sso-login/</guid><category><![CDATA[b2b]]></category><category><![CDATA[sso]]></category><category><![CDATA[saas]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 01 Dec 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/023902b9aeb3c53c126f195867a048cd/7f8e9/b2b-saas.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the role of SSO login in B2B SaaS. This blog explores challenges, emerging trends, and crucial considerations for enterprises in 2024. From security measures to user-centric design, stay ahead in the dynamic realm of B2B SaaS. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/b2b-saas-sso-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Continuous Adaptive Trust - Adaptive Authentication Future]]></title><description><![CDATA[Discover the game-changing evolution of authentication with Continuous Adaptive Trust (CAT) in 2024 & beyond. CAT ensures a secure, seamless digital experience by continuously assessing trust in real time, making it a pivotal shift in cybersecurity.]]></description><link>https://www.loginradius.com/blog/growth/continuous-adaptive-authentication-future-2024/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/continuous-adaptive-authentication-future-2024/</guid><category><![CDATA[continuous adaptive authentication]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 23 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e08d42a99e659d4cd0e68f3507612d38/7f8e9/continuous-adptive-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the game-changing evolution of authentication with Continuous Adaptive Trust (CAT) in 2024 &amp; beyond. CAT ensures a secure, seamless digital experience by continuously assessing trust in real time, making it a pivotal shift in cybersecurity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/continuous-adaptive-authentication-future-2024/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Securing Corporate Applications: A Comprehensive Guide to Enterprise Application Security]]></title><description><![CDATA[In the tech-driven business world, safeguarding corporate applications is crucial. This blog guides you through evolving threats, proactive measures, and key components to ensure the security of critical applications.]]></description><link>https://www.loginradius.com/blog/identity/enterprise-application-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/enterprise-application-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9ed73cc9955115c19de57cb880f6c714/7f8e9/application-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the tech-driven business world, safeguarding corporate applications is crucial. This blog guides you through evolving threats, proactive measures, and key components to ensure the security of critical applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/enterprise-application-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Strengthening Security Measures: The Role of Two-Factor Authentication (2FA)]]></title><description><![CDATA[Dive into the world of Two-Factor Authentication (2FA) and its pivotal role in fortifying security. Discover the dual-layered defense, benefits against cyber threats, and insights on implementing MFA and RBA for a proactive defense strategy.]]></description><link>https://www.loginradius.com/blog/identity/2fa-security-measures/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/2fa-security-measures/</guid><category><![CDATA[data security]]></category><category><![CDATA[2FA]]></category><category><![CDATA[MFA]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/976022ff2dee8797b4469c7c10d125e2/7f8e9/2fa-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the world of Two-Factor Authentication (2FA) and its pivotal role in fortifying security. Discover the dual-layered defense, benefits against cyber threats, and insights on implementing MFA and RBA for a proactive defense strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/2fa-security-measures/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Securing the Throne: Privileged Access Management (PAM) Best Practices Unveiled]]></title><description><![CDATA[Unveil the secrets of Privileged Access Management (PAM) and fortify your digital castle. Discover key practices like least privilege, secure shared accounts, and robust authentication. PAM is your sovereign shield against cyber threats in the ever-evolving cybersecurity landscape.]]></description><link>https://www.loginradius.com/blog/identity/pam-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pam-best-practices/</guid><category><![CDATA[identity access management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 14 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/635396d07d5b080c9417f8631155c15e/7f8e9/pam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unveil the secrets of Privileged Access Management (PAM) and fortify your digital castle. Discover key practices like least privilege, secure shared accounts, and robust authentication. PAM is your sovereign shield against cyber threats in the ever-evolving cybersecurity landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pam-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Common Authentication Vulnerabilities to Steer Clear of]]></title><description><![CDATA[Explore the prevalent authentication vulnerabilities that put your online identity at risk. Learn how LoginRadius MFA enhances security, ensuring a safer online experience.]]></description><link>https://www.loginradius.com/blog/identity/authentication-vulnerabilities-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-vulnerabilities-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 09 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f29db48e3aa3de684e1bcc0014deb53c/7f8e9/auth-vulnerabilities.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the prevalent authentication vulnerabilities that put your online identity at risk. Learn how LoginRadius MFA enhances security, ensuring a safer online experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-vulnerabilities-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Unlocking Success: Marketing in a Cookieless World with Zero-Party Data]]></title><description><![CDATA[Discover the power of zero-party data in the cookieless era. Explore innovative strategies for personalized marketing and trust-building. Embrace ethical practices and human connection to unlock unprecedented success in the digital world.]]></description><link>https://www.loginradius.com/blog/growth/zero-party-data/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/zero-party-data/</guid><category><![CDATA[zero-party]]></category><category><![CDATA[progressive profiling]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3a2ed5987e803993d15899484baaf354/7f8e9/zero-party-data.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the power of zero-party data in the cookieless era. Explore innovative strategies for personalized marketing and trust-building. Embrace ethical practices and human connection to unlock unprecedented success in the digital world. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/zero-party-data/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Identity Lifecycle Management?]]></title><description><![CDATA[In a digital age filled with online services and remote work, securing sensitive data is paramount. Our blog delves into Identity Lifecycle Management (ILM), an essential business solution. Discover the components of ILM, its role in cybersecurity, and how it ensures authorized access while addressing security concerns and compliance. Stay ahead in the digital landscape by embracing the power of Identity Lifecycle Management.]]></description><link>https://www.loginradius.com/blog/identity/identity-lifecycle-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-lifecycle-management/</guid><category><![CDATA[identity management]]></category><category><![CDATA[user management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 02 Nov 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9cf267dde3747cb5fdc0a5a7ed089282/7f8e9/lifecycle-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In a digital age filled with online services and remote work, securing sensitive data is paramount. Our blog delves into Identity Lifecycle Management (ILM), an essential business solution. Discover the components of ILM, its role in cybersecurity, and how it ensures authorized access while addressing security concerns and compliance. Stay ahead in the digital landscape by embracing the power of Identity Lifecycle Management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-lifecycle-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Strengthening Security and Compliance: The Role of Identity Governance]]></title><description><![CDATA[Discover the challenges posed by cyber threats and regulatory demands, and delve into the integral role of identity governance solutions. From stringent access controls to real-time compliance monitoring, automation, and risk management, these tools provide a comprehensive approach to fortifying cloud security. Stay ahead of evolving threats and industry standards with cutting-edge identity governance strategies, ensuring unparalleled security and compliance for your business.]]></description><link>https://www.loginradius.com/blog/identity/identity-governance-cloud-security-compliance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-governance-cloud-security-compliance/</guid><category><![CDATA[identity governance]]></category><category><![CDATA[cloud security]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/54eeeedd3f65fb636d19c8eb01e6c8e4/7f8e9/strength-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the challenges posed by cyber threats and regulatory demands, and delve into the integral role of identity governance solutions. From stringent access controls to real-time compliance monitoring, automation, and risk management, these tools provide a comprehensive approach to fortifying cloud security. Stay ahead of evolving threats and industry standards with cutting-edge identity governance strategies, ensuring unparalleled security and compliance for your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-governance-cloud-security-compliance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Understanding the Okta Hack: Breach in Customer Support and Lessons for Organizations]]></title><description><![CDATA[Learn about the recent Okta data breach, highlighting the risks businesses face from social engineering attacks. Discover the impact on Okta's customer support unit and understand the importance of stringent security measures for organizations. Learn from the breach and enhance your cybersecurity protocols to safeguard customer data effectively.]]></description><link>https://www.loginradius.com/blog/identity/okta-hack-breach-lessons/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/okta-hack-breach-lessons/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 27 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/975371d1135d861a520733f2472c33ba/7f8e9/data-breach.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the recent Okta data breach, highlighting the risks businesses face from social engineering attacks. Discover the impact on Okta&apos;s customer support unit and understand the importance of stringent security measures for organizations. Learn from the breach and enhance your cybersecurity protocols to safeguard customer data effectively. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/okta-hack-breach-lessons/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Managing Generative AI Security Risks in the Enterprise- A Quick Guide]]></title><description><![CDATA[Navigate generative AI security with our concise guide for enterprises. From data encryption to countering adversarial attacks, discover essential strategies for safeguarding your digital assets. Embrace transparency and empower your team to stay ahead in the rapidly evolving landscape of AI innovation.]]></description><link>https://www.loginradius.com/blog/identity/ai-security-risk-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ai-security-risk-management/</guid><category><![CDATA[data security]]></category><category><![CDATA[artificial intelligence]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5480e1f8357e56219a313c38533c13e0/7f8e9/ai-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Navigate generative AI security with our concise guide for enterprises. From data encryption to countering adversarial attacks, discover essential strategies for safeguarding your digital assets. Embrace transparency and empower your team to stay ahead in the rapidly evolving landscape of AI innovation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ai-security-risk-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Unveiling the Customer Identity Business Case: Strategies for Success]]></title><description><![CDATA[Dive into the world of the customer identity base case – your key to personalized success. Explore strategies for tailored experiences, fraud prevention, and ethical data practices. Stay ahead in the digital era with our expert insights.]]></description><link>https://www.loginradius.com/blog/growth/customer-identity-use-case/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-identity-use-case/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 19 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/30c289be718cbbc60b24e207a4cd3ca7/7f8e9/cust-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the world of the customer identity base case – your key to personalized success. Explore strategies for tailored experiences, fraud prevention, and ethical data practices. Stay ahead in the digital era with our expert insights. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-identity-use-case/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Empowering Your Security: Exploring the Advantages of Time-Based One-Time Passwords (TOTP)]]></title><description><![CDATA[From thwarting replay attacks to seamless integration across devices, TOTP ensures robust protection while providing a user-friendly experience. Embrace TOTP as more than a choice—it's a strategic investment in your digital security, promising a safer online journey for individuals and organizations alike.]]></description><link>https://www.loginradius.com/blog/identity/one-time-passwords-security-benefits/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/one-time-passwords-security-benefits/</guid><category><![CDATA[data security]]></category><category><![CDATA[OTP]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 17 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/036917194f19fa4160e4c341d3b6421c/7f8e9/one-time-passwords.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; From thwarting replay attacks to seamless integration across devices, TOTP ensures robust protection while providing a user-friendly experience. Embrace TOTP as more than a choice—it&apos;s a strategic investment in your digital security, promising a safer online journey for individuals and organizations alike. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/one-time-passwords-security-benefits/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Elevating Data Precision-Power of Identity Resolution]]></title><description><![CDATA[Dive into the world of identity resolution and learn how businesses connect data dots, ensuring precision in every interaction. Uncover real-life examples in healthcare and retail and understand the challenges organizations face. Embrace these techniques for unparalleled success in today's competitive landscape.]]></description><link>https://www.loginradius.com/blog/growth/identity-resolution-data-accuracy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-resolution-data-accuracy/</guid><category><![CDATA[data governance]]></category><category><![CDATA[e-commerce]]></category><category><![CDATA[identity resolution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 12 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/768c5a755b974ca85c857596d4e2452e/7f8e9/identity-resolution.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the world of identity resolution and learn how businesses connect data dots, ensuring precision in every interaction. Uncover real-life examples in healthcare and retail and understand the challenges organizations face. Embrace these techniques for unparalleled success in today&apos;s competitive landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-resolution-data-accuracy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[The Future of Personalization: Embracing Zero-Party Data]]></title><description><![CDATA[Unlock the secrets behind seamless online personalization with Zero-Party Data! This blog explores how your willingly shared preferences revolutionize digital experiences. From tailored shopping to personalized content, discover the magic of Zero-Party Data and embrace a future where your online adventures are truly yours.]]></description><link>https://www.loginradius.com/blog/identity/zero-party-data-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/zero-party-data-experience/</guid><category><![CDATA[zero-trust security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 10 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3ddf42912172da0a579fb7dd70543d33/7f8e9/future-of-personalization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unlock the secrets behind seamless online personalization with Zero-Party Data! This blog explores how your willingly shared preferences revolutionize digital experiences. From tailored shopping to personalized content, discover the magic of Zero-Party Data and embrace a future where your online adventures are truly yours. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/zero-party-data-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Comprehensive Guide to Flexible CIAM Deployment Options with LoginRadius]]></title><description><![CDATA[User experience and security are non-negotiable in the modern digital world. Dive into our guide on CIAM deployment options with LoginRadius, a leader in the CIAM landscape. Explore seamless features like social login, Single Sign-On (SSO), passwordless login, and cloud integrations. Elevate user engagement, streamline access control, and fortify online security. Discover the strategic necessity of investing in advanced CIAM solutions, ensuring your users enjoy a secure, hassle-free online experience.]]></description><link>https://www.loginradius.com/blog/identity/ciam-deployment-flexibility/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-deployment-flexibility/</guid><category><![CDATA[single sign-on]]></category><category><![CDATA[social login]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[ciam solutions]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 06 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ea736fea39d05d105a16c3d79bde35ff/7f8e9/ciam-deployment.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; User experience and security are non-negotiable in the modern digital world. Dive into our guide on CIAM deployment options with LoginRadius, a leader in the CIAM landscape. Explore seamless features like social login, Single Sign-On (SSO), passwordless login, and cloud integrations. Elevate user engagement, streamline access control, and fortify online security. Discover the strategic necessity of investing in advanced CIAM solutions, ensuring your users enjoy a secure, hassle-free online experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-deployment-flexibility/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Small Steps, Big Shields: Navigating Cybersecurity Awareness Month 2023 Safely]]></title><description><![CDATA[Cybersecurity Awareness Month 2023 is a crucial reminder in the digital age where every click matters. Join us at LoginRadius as we spread the word about the importance of user endpoint security, employee training, strong passwords, multi-factor authentication, and phishing prevention. Discover how these small steps can create impenetrable shields, safeguarding your organization amid evolving cyber threats. Stay safe, stay vigilant, and empower your team with knowledge during Cybersecurity Awareness Month 2023!]]></description><link>https://www.loginradius.com/blog/identity/cybersecurity-awareness-month-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cybersecurity-awareness-month-2023/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[passwordless authentication]]></category><category><![CDATA[multi-factor authentication]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Tue, 03 Oct 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8ef3309b7df90eb71d1a2c70d2edf2d/7f8e9/cybersecurity-awareness-2023.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybersecurity Awareness Month 2023 is a crucial reminder in the digital age where every click matters. Join us at LoginRadius as we spread the word about the importance of user endpoint security, employee training, strong passwords, multi-factor authentication, and phishing prevention. Discover how these small steps can create impenetrable shields, safeguarding your organization amid evolving cyber threats. Stay safe, stay vigilant, and empower your team with knowledge during Cybersecurity Awareness Month 2023! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cybersecurity-awareness-month-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Streamlining Access with Converged Identity Platforms]]></title><description><![CDATA[A Converged Identity Platform (CIP) is a unique solution that unifies the management of identities, access controls, and security policies across an organization. It brings together various components like Single Sign-On (SSO), Multi-Factor Authentication (MFA), User Provisioning, and Identity Governance and Administration (IGA) into a single digital ecosystem. CIP eliminates the need for numerous disjointed systems and offers a centralized process for identity management.]]></description><link>https://www.loginradius.com/blog/identity/converged-identity-platforms/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/converged-identity-platforms/</guid><category><![CDATA[identity governance]]></category><category><![CDATA[user provisioning]]></category><category><![CDATA[sso]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b13accf84e655bfd1a001c704fd7f4d4/7f8e9/streamlined-access.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A Converged Identity Platform (CIP) is a unique solution that unifies the management of identities, access controls, and security policies across an organization. It brings together various components like Single Sign-On (SSO), Multi-Factor Authentication (MFA), User Provisioning, and Identity Governance and Administration (IGA) into a single digital ecosystem. CIP eliminates the need for numerous disjointed systems and offers a centralized process for identity management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/converged-identity-platforms/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Making a Difference: LoginRadius' Sanitary Pad Donation Drive]]></title><description><![CDATA[Join LoginRadius in our mission to create a positive change in our community. Learn how we're providing sanitary pads, educating women, and making a difference in the lives of underprivileged girls. Together, we can ensure dignity, comfort, and safety for all during their menstrual cycles.]]></description><link>https://www.loginradius.com/blog/growth/sanitary-pad-donation-drive/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/sanitary-pad-donation-drive/</guid><category><![CDATA[LoginRadius donation drive]]></category><category><![CDATA[women empowerment]]></category><category><![CDATA[hope basket foundation]]></category><dc:creator><![CDATA[Azharuddin Mohammad]]></dc:creator><pubDate>Wed, 27 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e9ab3b6cc4b571b6ec74f72c4eb59893/7f8e9/social-cause.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Join LoginRadius in our mission to create a positive change in our community. Learn how we&apos;re providing sanitary pads, educating women, and making a difference in the lives of underprivileged girls. Together, we can ensure dignity, comfort, and safety for all during their menstrual cycles. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/sanitary-pad-donation-drive/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Azharuddin Mohammad&amp;size=100</authorImage></item><item><title><![CDATA[How Retailers Can Balance Privacy While Foiling Thieves]]></title><description><![CDATA[In the world of retail, finding the balance between privacy and security is paramount. This delicate equilibrium ensures compliance with evolving regulations and builds trust and loyalty among customers. By embracing modern technologies like passwordless authentication and robust data governance, retailers can safeguard privacy while enhancing the customer experience.]]></description><link>https://www.loginradius.com/blog/identity/privacy-data-security-retail/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/privacy-data-security-retail/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Jackson Maven]]></dc:creator><pubDate>Wed, 27 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cec0e7e19ebbf99a6724208ee2b9e2ec/7f8e9/privacy-balancing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the world of retail, finding the balance between privacy and security is paramount. This delicate equilibrium ensures compliance with evolving regulations and builds trust and loyalty among customers. By embracing modern technologies like passwordless authentication and robust data governance, retailers can safeguard privacy while enhancing the customer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/privacy-data-security-retail/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jackson Maven&amp;size=100</authorImage></item><item><title><![CDATA[The Power of No-code Customer IAM in Reducing Churn]]></title><description><![CDATA[In today's ever-expanding competitive business landscape, combating customer churn is a top priority. This article delves into the game-changing potential of No-code CIAM, exploring its impact on customer onboarding, engagement, security, and data-driven decision-making. Discover how businesses can harness No-code CIAM to foster lasting customer relationships and drive long-term success.]]></description><link>https://www.loginradius.com/blog/identity/no-code-ciam-churn-reduction/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/no-code-ciam-churn-reduction/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Chirag Bhavsar]]></dc:creator><pubDate>Fri, 22 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eb31fa2d7a622fb013771cf24a4ebfa3/7f8e9/no-code-ciam-churn.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s ever-expanding competitive business landscape, combating customer churn is a top priority. This article delves into the game-changing potential of No-code CIAM, exploring its impact on customer onboarding, engagement, security, and data-driven decision-making. Discover how businesses can harness No-code CIAM to foster lasting customer relationships and drive long-term success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/no-code-ciam-churn-reduction/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chirag Bhavsar&amp;size=100</authorImage></item><item><title><![CDATA[8 Essential Insights for Enabling E-Commerce Social Login]]></title><description><![CDATA[E-commerce social login is the way forward for businesses looking to simplify user authentication and improve the overall user experience. However, success lies in the details, from offering multiple social login options to prioritizing data privacy and security. Explore these eight essential insights to ensure your e-commerce platform thrives in the age of social login.]]></description><link>https://www.loginradius.com/blog/growth/ecommerce-social-login-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ecommerce-social-login-success/</guid><category><![CDATA[ecommerce]]></category><category><![CDATA[social login]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 20 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2efa86a19e527a12b836c1eb916d01f8/7f8e9/ecommerce-social-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; E-commerce social login is the way forward for businesses looking to simplify user authentication and improve the overall user experience. However, success lies in the details, from offering multiple social login options to prioritizing data privacy and security. Explore these eight essential insights to ensure your e-commerce platform thrives in the age of social login. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ecommerce-social-login-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[CIAM: Enhancing Security & Building Consumer Trust-All At Once]]></title><description><![CDATA[CIAM (customer identity & access management) emerges as a boon for organizations that constantly seek efficient and capable methods of dealing with customer identity management, increasing user engagement, enhancing data security, and building brand loyalty.  By implementing CIAM techniques, an organization can improve its overall operational efficiency.]]></description><link>https://www.loginradius.com/blog/identity/ciam-data-security-user-trust/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-data-security-user-trust/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 15 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4bbc30d87b5324618f09b5be35b6e95d/7f8e9/user-trust.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIAM (customer identity &amp; access management) emerges as a boon for organizations that constantly seek efficient and capable methods of dealing with customer identity management, increasing user engagement, enhancing data security, and building brand loyalty.  By implementing CIAM techniques, an organization can improve its overall operational efficiency. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-data-security-user-trust/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Maintaining Trust: Customer Identity Verification Challenges & Best Practices]]></title><description><![CDATA[Trust is paramount for successful customer relationships in our digital age. However, customer identity verification faces evolving challenges, from identity theft to balancing security with a seamless user experience. Explore how adopting multi-layered verification, leveraging AI, complying with regulations, and educating users can help businesses maintain trust in the ever-changing landscape of online interactions.]]></description><link>https://www.loginradius.com/blog/identity/customer-identity-verification-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identity-verification-best-practices/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[customer trust]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 13 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/49344edf7996badf2b29cc8fe0a788de/7f8e9/customer-id-verification.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Trust is paramount for successful customer relationships in our digital age. However, customer identity verification faces evolving challenges, from identity theft to balancing security with a seamless user experience. Explore how adopting multi-layered verification, leveraging AI, complying with regulations, and educating users can help businesses maintain trust in the ever-changing landscape of online interactions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identity-verification-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Exploring the Vital Role of Consent Management for Your Online Store]]></title><description><![CDATA[In today’s modern digital world, online success hinges on more than just great products and user-friendly interfaces. It's about respecting privacy, complying with regulations, and fostering trust. Consent management plays a vital role in achieving these goals. By being transparent about data usage, respecting customer privacy, and complying with regulations like GDPR, you not only avoid legal troubles but also gain a competitive edge.]]></description><link>https://www.loginradius.com/blog/growth/consent-management-online-retail/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consent-management-online-retail/</guid><category><![CDATA[consent management]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 08 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a7556ec0ac12630dbce0d5e462f502a3/7f8e9/online-store-consent-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today’s modern digital world, online success hinges on more than just great products and user-friendly interfaces. It&apos;s about respecting privacy, complying with regulations, and fostering trust. Consent management plays a vital role in achieving these goals. By being transparent about data usage, respecting customer privacy, and complying with regulations like GDPR, you not only avoid legal troubles but also gain a competitive edge. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consent-management-online-retail/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Unlocking Smartphone Security: How to Hackproof Your Smartphone]]></title><description><![CDATA[In today's digital age, where smartphones are integral to our daily lives, securing them is paramount. But is it possible to truly hackproof your smartphone in an ever-expanding cyber threat landscape? Let’s dive into the types of hacks and attacks you need to be aware of and provide seven practical tips to bolster your smartphone's security.]]></description><link>https://www.loginradius.com/blog/identity/hackproof-smartphone-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/hackproof-smartphone-security/</guid><category><![CDATA[data protection]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[biometric authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Wed, 06 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/390178ac3125ea3e474d0dae5a7ecd8c/7f8e9/hackproof-smartphone.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s digital age, where smartphones are integral to our daily lives, securing them is paramount. But is it possible to truly hackproof your smartphone in an ever-expanding cyber threat landscape? Let’s dive into the types of hacks and attacks you need to be aware of and provide seven practical tips to bolster your smartphone&apos;s security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/hackproof-smartphone-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Phishing-Resistant MFA Login for Mobile Applications:  Strategies and Challenges]]></title><description><![CDATA[Phishing-resistant multi-factor Authentication (MFA) login is a unique approach to information security that aims to strengthen the defenses against phishing attacks. Know all about the strategies and challenges involved.]]></description><link>https://www.loginradius.com/blog/identity/phishing-resistant-mfa-login-mobile-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/phishing-resistant-mfa-login-mobile-apps/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa login]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Mon, 04 Sep 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/28c6563c86d85d33a318eafed328f0a8/7f8e9/phishing-resistant.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Phishing-resistant multi-factor Authentication (MFA) login is a unique approach to information security that aims to strengthen the defenses against phishing attacks. Know all about the strategies and challenges involved. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/phishing-resistant-mfa-login-mobile-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Unveiling the Benefits of Identity Verification for Online Retailers ]]></title><description><![CDATA[In the dynamic realm of online retail, establishing trust while countering cyber threats is paramount. Identity verification emerges as a game-changer, bolstering security, trust, compliance, and even personalization. Dive into the advantages it brings to businesses navigating the digital landscape.]]></description><link>https://www.loginradius.com/blog/growth/identity-verification-retailers-benefits/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-verification-retailers-benefits/</guid><category><![CDATA[digital identity verification]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 31 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/09390f8957c5422179a1bf3dd1c365df/7f8e9/identity-verification.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the dynamic realm of online retail, establishing trust while countering cyber threats is paramount. Identity verification emerges as a game-changer, bolstering security, trust, compliance, and even personalization. Dive into the advantages it brings to businesses navigating the digital landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-verification-retailers-benefits/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[True Passwordless Authentication: Stronger Defense Against Cyberattacks]]></title><description><![CDATA[True passwordless authentication has broadened the horizons for businesses seeking secure yet user-friendly authentication mechanisms. This authentication mechanism helps enterprises to safeguard sensitive information and further gain the trust of their customers with a safe digital environment.]]></description><link>https://www.loginradius.com/blog/identity/true-passwordless-authentication-cyberattacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/true-passwordless-authentication-cyberattacks/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 29 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e239555d1efbeb4f90813faa14bdd814/7f8e9/true-passwordless-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; True passwordless authentication has broadened the horizons for businesses seeking secure yet user-friendly authentication mechanisms. This authentication mechanism helps enterprises to safeguard sensitive information and further gain the trust of their customers with a safe digital environment. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/true-passwordless-authentication-cyberattacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Customer-Centric Strategies: How CIAM and CRM Integration Optimize Consumer Experience]]></title><description><![CDATA[Any successful business knows that an excellent customer experience is essential; thus, a customer's needs and expectations are of utmost priority. Learn how to optimize your consumer experiences and boost customer-centric strategies.]]></description><link>https://www.loginradius.com/blog/growth/how-ciam-and-crm-integration-optimize-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-ciam-and-crm-integration-optimize-cx/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[user management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[King Conrad Fanoga]]></dc:creator><pubDate>Mon, 28 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ce9daea3706f860df6b6f851a63a3581/7f8e9/customer-experience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Any successful business knows that an excellent customer experience is essential; thus, a customer&apos;s needs and expectations are of utmost priority. Learn how to optimize your consumer experiences and boost customer-centric strategies. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-ciam-and-crm-integration-optimize-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=King Conrad Fanoga&amp;size=100</authorImage></item><item><title><![CDATA[Identity Governance vs. Identity Management: Navigating the Differences]]></title><description><![CDATA[Explore the differences between Identity Governance and Identity Management in the dynamic world of digital identities. Discover why businesses must balance these concepts to achieve security, compliance, and operational efficiency in the modern landscape.]]></description><link>https://www.loginradius.com/blog/identity/identity-governance-vs-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-governance-vs-identity-management/</guid><category><![CDATA[identity governance]]></category><category><![CDATA[identity management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 21 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a4c2400baaaf6168432392ac27ce3029/7f8e9/id-governance-vs-id-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the differences between Identity Governance and Identity Management in the dynamic world of digital identities. Discover why businesses must balance these concepts to achieve security, compliance, and operational efficiency in the modern landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-governance-vs-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[CIAM for Digital Marketers: The Key to Nurture & Convert Leads]]></title><description><![CDATA[In a world where personalized digital experiences define customer success, businesses must put their best foot forward to deliver seamless and secure customized experiences. CIAM emerges as the ultimate solution, enabling marketers to nurture leads and achieve higher conversion rates. Learn how CIAM forges meaningful connections, instills trust, and transforms prospects into loyal customers.]]></description><link>https://www.loginradius.com/blog/growth/nurture-and-convert-leads-with-power-of-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/nurture-and-convert-leads-with-power-of-ciam/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 17 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0241f458db1b8ef129fb9af6f76fc21d/7f8e9/power-of-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In a world where personalized digital experiences define customer success, businesses must put their best foot forward to deliver seamless and secure customized experiences. CIAM emerges as the ultimate solution, enabling marketers to nurture leads and achieve higher conversion rates. Learn how CIAM forges meaningful connections, instills trust, and transforms prospects into loyal customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/nurture-and-convert-leads-with-power-of-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Navigating Identity Verification Challenges in Regulated Industries: 7 Effective Solutions]]></title><description><![CDATA[Explore solutions to identity verification challenges faced by regulated industries. From fraud prevention and compliance management to user experience enhancement, learn how the LoginRadius CIAM platform leverages cutting-edge technologies to navigate the intricate terrain of identity verification while ensuring security and trust.]]></description><link>https://www.loginradius.com/blog/identity/identity-verification-challenges-and-solutions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-verification-challenges-and-solutions/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[compliance]]></category><category><![CDATA[biometric authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 14 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1d46dff28f1b0100e9cae406b61eff4/7f8e9/idntity-verification.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore solutions to identity verification challenges faced by regulated industries. From fraud prevention and compliance management to user experience enhancement, learn how the LoginRadius CIAM platform leverages cutting-edge technologies to navigate the intricate terrain of identity verification while ensuring security and trust. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-verification-challenges-and-solutions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Breaking Down the Decision: Why We Chose AWS ElastiCache Over Redis Cloud]]></title><description><![CDATA[ElastiCache’s capabilities are better suited than Redis Cloud for our technical requirements and use cases, especially better scalability and pricing.]]></description><link>https://www.loginradius.com/blog/engineering/smart-cache-redis-cloud-aws-elasticache-for-redis/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/smart-cache-redis-cloud-aws-elasticache-for-redis/</guid><category><![CDATA[Cache]]></category><category><![CDATA[AWS]]></category><category><![CDATA[Redis]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 09 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c24493552cd32d4940767196408ef18d/58556/migrating-to-aws-elasticache-for-redis.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; ElastiCache’s capabilities are better suited than Redis Cloud for our technical requirements and use cases, especially better scalability and pricing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/smart-cache-redis-cloud-aws-elasticache-for-redis/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[What Is Identity Resolution And How Can It Benefit Your Business?]]></title><description><![CDATA[Uncover the power of identity resolution to boost your business. Enhance customer experiences, optimize marketing efforts, and mitigate fraud risks with accurate, unified customer data.]]></description><link>https://www.loginradius.com/blog/growth/what-is-identity-resolution/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/what-is-identity-resolution/</guid><category><![CDATA[identity resolution]]></category><category><![CDATA[user management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 09 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f18ea2e83b6427edc2d810d5a8806ef2/7f8e9/identity-resolution.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Uncover the power of identity resolution to boost your business. Enhance customer experiences, optimize marketing efforts, and mitigate fraud risks with accurate, unified customer data. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/what-is-identity-resolution/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Enhancing Security: Leveraging 5 Real-Time Techniques to Detect Phishing Attacks]]></title><description><![CDATA[Enhance your security with real-time techniques for detecting and preventing phishing attacks. Discover how behavior analysis, machine learning, URL reputation assessment, and collaboration empower proactive defense against real-time phishing threats.]]></description><link>https://www.loginradius.com/blog/identity/real-time-techniques-detect-phishing-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/real-time-techniques-detect-phishing-attacks/</guid><category><![CDATA[phishing attacks]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Mon, 07 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8bb72f1c6dedc21ca6f7f9f83d7d898/7f8e9/phishing-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Enhance your security with real-time techniques for detecting and preventing phishing attacks. Discover how behavior analysis, machine learning, URL reputation assessment, and collaboration empower proactive defense against real-time phishing threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/real-time-techniques-detect-phishing-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[7 Tips on How CISOs Should Present Identity Security to Board Members]]></title><description><![CDATA[While most CISOs are now concerned about the risks associated with customer identity security and identity thefts, they’re struggling to create a strategy to convince the board members to prepare beforehand. And to help CISOs present a compelling identity security strategy to board members, we’ve compiled a list of some helpful tips.]]></description><link>https://www.loginradius.com/blog/growth/tips-on-how-cisos-convince-board-members/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/tips-on-how-cisos-convince-board-members/</guid><category><![CDATA[customer identity security]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 04 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3ca21cd4370d8ba8945b60f09f33d49a/7f8e9/board-members.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While most CISOs are now concerned about the risks associated with customer identity security and identity thefts, they’re struggling to create a strategy to convince the board members to prepare beforehand. And to help CISOs present a compelling identity security strategy to board members, we’ve compiled a list of some helpful tips. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/tips-on-how-cisos-convince-board-members/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Comprehensive Guide to the Five A's of Cloud Identity Management]]></title><description><![CDATA[Discover the vital elements contributing to a secure and efficient cloud identity framework, from strong authentication methods to centralized account management and comprehensive audit logging.]]></description><link>https://www.loginradius.com/blog/identity/guide-to-five-a-of-cloud-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/guide-to-five-a-of-cloud-identity-management/</guid><category><![CDATA[cloud identity]]></category><category><![CDATA[identity management]]></category><category><![CDATA[biometric authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 03 Aug 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/73b4898a719dde7b9393b8f2598a23d5/c0524/cloud-identity-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the vital elements contributing to a secure and efficient cloud identity framework, from strong authentication methods to centralized account management and comprehensive audit logging. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/guide-to-five-a-of-cloud-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Understanding the Difference Between Identity Access Management On-Premise and Cloud]]></title><description><![CDATA[Dive into comparing on-premise and cloud IAM solutions, understanding their unique features and factors to consider. Make the right choice to strengthen your organization's security and access management.]]></description><link>https://www.loginradius.com/blog/identity/understanding-on-premise-vs-cloud-iam-difference/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/understanding-on-premise-vs-cloud-iam-difference/</guid><category><![CDATA[identity management]]></category><category><![CDATA[cloud identity]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 31 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/62d415161563959ac6ff8c17b1ae0081/7f8e9/on-premise-vs-cloud-iam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into comparing on-premise and cloud IAM solutions, understanding their unique features and factors to consider. Make the right choice to strengthen your organization&apos;s security and access management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/understanding-on-premise-vs-cloud-iam-difference/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Learn the Impact of Identity Theft on Businesses in 2023]]></title><description><![CDATA[In 2023, identity theft has become a pressing concern for businesses, posing significant risks and consequences. This blog explores the implications of identity theft, including financial loss, reputational damage, and legal consequences. Discover the importance of proactive measures and cybersecurity practices to mitigate the risks.]]></description><link>https://www.loginradius.com/blog/identity/identity-theft-impact-on-businesses-in-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-theft-impact-on-businesses-in-2023/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Wed, 26 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4393121ab925d6c1ccca58c53c65db7a/7f8e9/identity-theft.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In 2023, identity theft has become a pressing concern for businesses, posing significant risks and consequences. This blog explores the implications of identity theft, including financial loss, reputational damage, and legal consequences. Discover the importance of proactive measures and cybersecurity practices to mitigate the risks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-theft-impact-on-businesses-in-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Happy Birthday, LoginRadius: Two Years Away From Becoming A Teenager]]></title><description><![CDATA[I still vividly remember the day when I incorporated the company on July 20, 2012. At that time, all we had was an idea—an idea to solve the login problem for billions of internet users. As we approach our 11th birthday, I can't help but feel a little nostalgic.]]></description><link>https://www.loginradius.com/blog/growth/happy-birthday-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/happy-birthday-loginradius/</guid><category><![CDATA[LoginRadius birthday]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 24 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d2bcccb590995f15d06b9fbf2d064311/7f8e9/LR-birthday.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; I still vividly remember the day when I incorporated the company on July 20, 2012. At that time, all we had was an idea—an idea to solve the login problem for billions of internet users. As we approach our 11th birthday, I can&apos;t help but feel a little nostalgic. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/happy-birthday-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Identity Should Be At The Centre of Your Customer Strategy]]></title><description><![CDATA[Dive into the vital role of identity in your customer strategy. Explore how leveraging identity data can revolutionize personalization, establish trust, ensure seamless experiences across channels, drive data-driven decision-making, and maximize customer lifetime value.]]></description><link>https://www.loginradius.com/blog/growth/identity-at-centre-of-your-customer-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-at-centre-of-your-customer-strategy/</guid><category><![CDATA[identity management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 20 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a0207c31c3e87a7981a5f736f922211a/7f8e9/identity-at-centre.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dive into the vital role of identity in your customer strategy. Explore how leveraging identity data can revolutionize personalization, establish trust, ensure seamless experiences across channels, drive data-driven decision-making, and maximize customer lifetime value. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-at-centre-of-your-customer-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[LDAP Authentication: Meaning and How it Works?]]></title><description><![CDATA[Explore the world of LDAP authentication, its meaning, and how it works. Discover its applications, including integration with Active Directory. Learn about the client-server authentication process and the challenges involved.]]></description><link>https://www.loginradius.com/blog/identity/what-is-ldap-authentication-and-how-it-works/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-ldap-authentication-and-how-it-works/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 20 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c79d42f911c59b1745f3f9835694cc97/7f8e9/ldap-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the world of LDAP authentication, its meaning, and how it works. Discover its applications, including integration with Active Directory. Learn about the client-server authentication process and the challenges involved. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-ldap-authentication-and-how-it-works/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Flexible Work Culture: A Game-Changer for LoginRadius and its Employees]]></title><description><![CDATA[At LoginRadius, we believe that good work comes from a healthy work-life balance. That's why we've created a flexible working environment that allows our employees to make the most of their time and energy while they're at work. But what does it mean to have a flexible work culture, anyway? Let's dig in.]]></description><link>https://www.loginradius.com/blog/growth/flexible-work-culture-game-changer-for-employees/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/flexible-work-culture-game-changer-for-employees/</guid><category><![CDATA[flexible work culture]]></category><category><![CDATA[work life balance]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Azharuddin Mohammad]]></dc:creator><pubDate>Thu, 13 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/527523993c6a0776c7fb2c1cafef05fd/7f8e9/flexible-work-culture.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; At LoginRadius, we believe that good work comes from a healthy work-life balance. That&apos;s why we&apos;ve created a flexible working environment that allows our employees to make the most of their time and energy while they&apos;re at work. But what does it mean to have a flexible work culture, anyway? Let&apos;s dig in. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/flexible-work-culture-game-changer-for-employees/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Azharuddin Mohammad&amp;size=100</authorImage></item><item><title><![CDATA[7 Things Your Security Team Need To Know Before Creating A CIAM Strategy]]></title><description><![CDATA[The challenges of developing a CIAM strategy can be daunting. We have put together a comprehensive guide on how to create an effective CIAM strategy that will keep your customers happy and your business secure.]]></description><link>https://www.loginradius.com/blog/identity/things-to-know-before-creating-ciam-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/things-to-know-before-creating-ciam-strategy/</guid><category><![CDATA[ciam solutions]]></category><category><![CDATA[compliance]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 13 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/55d1ea81ae502867b6f3bd41b853adad/7f8e9/ciam-strategy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The challenges of developing a CIAM strategy can be daunting. We have put together a comprehensive guide on how to create an effective CIAM strategy that will keep your customers happy and your business secure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/things-to-know-before-creating-ciam-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[The Growing Digital Enterprise: Achieving Success Through a Multi-Brand Strategy]]></title><description><![CDATA[Discover the power of a multi-brand strategy in the digital enterprise. From branding to market expansion and risk mitigation, this blog unveils the key elements that lead to success in the ever-changing digital landscape. Harness the potential of multiple brands to drive growth and deliver personalized experiences that resonate with your target audience.]]></description><link>https://www.loginradius.com/blog/growth/multi-brand-strategy-for-digital-enterprises/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/multi-brand-strategy-for-digital-enterprises/</guid><category><![CDATA[customer loyalty]]></category><category><![CDATA[identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 05 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/04d688ee7c4f57fff4f395ae4936d1d9/7f8e9/multi-brand-strategy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the power of a multi-brand strategy in the digital enterprise. From branding to market expansion and risk mitigation, this blog unveils the key elements that lead to success in the ever-changing digital landscape. Harness the potential of multiple brands to drive growth and deliver personalized experiences that resonate with your target audience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/multi-brand-strategy-for-digital-enterprises/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Choosing Between Self-Managed and Service-Based SSO Solutions: A Comprehensive Comparison]]></title><description><![CDATA[Here’s a comprehensive comparison between self-managed and service-based SSO solutions, exploring factors such as control, customization, maintenance, scalability, security, and cost. This blog will help you make an informed decision that aligns with your organization's needs and goals.]]></description><link>https://www.loginradius.com/blog/identity/self-managed-vs-service-based-sso-solutions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/self-managed-vs-service-based-sso-solutions/</guid><category><![CDATA[single sign-on]]></category><category><![CDATA[compliance]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 03 Jul 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/86f219b9ba454d53ad3e0ffbe98dbd94/7f8e9/self-managed-vs-service-based.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Here’s a comprehensive comparison between self-managed and service-based SSO solutions, exploring factors such as control, customization, maintenance, scalability, security, and cost. This blog will help you make an informed decision that aligns with your organization&apos;s needs and goals. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/self-managed-vs-service-based-sso-solutions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Uncovering Consumer Sentiments on Modern Identity: A Deep Dive Into Their Behavior]]></title><description><![CDATA[Today, consumers' attitudes toward modern identity are evolving rapidly. This blog explains the complexities of consumer sentiments, exploring the impact of social media, privacy concerns, inclusivity, and authenticity. Learn how businesses can effectively engage with their target audiences in this ever-changing landscape.]]></description><link>https://www.loginradius.com/blog/growth/consumer-sentiments-on-modern-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-sentiments-on-modern-identity/</guid><category><![CDATA[customer identity]]></category><category><![CDATA[identity management]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 26 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9f077597da0795060c5471653bd68da/7f8e9/modern-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, consumers&apos; attitudes toward modern identity are evolving rapidly. This blog explains the complexities of consumer sentiments, exploring the impact of social media, privacy concerns, inclusivity, and authenticity. Learn how businesses can effectively engage with their target audiences in this ever-changing landscape. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-sentiments-on-modern-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Striking the Perfect Balance: Leveraging Identity Orchestration for Cost, Security, & Enhanced UX]]></title><description><![CDATA[Discover the power of identity orchestration in achieving a balanced approach to cost, security, and user experience. Explore the advantages of centralized user management and streamlined authentication for a seamless digital environment that optimizes resources and enhances security measures.]]></description><link>https://www.loginradius.com/blog/growth/striking-balance-with-identity-orchestration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/striking-balance-with-identity-orchestration/</guid><category><![CDATA[identity orchestration]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 20 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/da0248d6fd90aa01d430f82551440bd8/7f8e9/identity-orchestration.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the power of identity orchestration in achieving a balanced approach to cost, security, and user experience. Explore the advantages of centralized user management and streamlined authentication for a seamless digital environment that optimizes resources and enhances security measures. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/striking-balance-with-identity-orchestration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Enhancing Customer Sign-In Journeys: The Power of Adaptive Authentication]]></title><description><![CDATA[Learn how adaptive authentication revolutionizes customer sign-in journeys by dynamically adjusting security levels. Find out how businesses can balance security and user experience and implement this advanced authentication method to enhance online services.]]></description><link>https://www.loginradius.com/blog/growth/power-of-adaptive-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/power-of-adaptive-authentication/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[adaptive authentication]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 13 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e9cd1f08d7480a38abbb9b68edeca0b1/7f8e9/adaptive-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how adaptive authentication revolutionizes customer sign-in journeys by dynamically adjusting security levels. Find out how businesses can balance security and user experience and implement this advanced authentication method to enhance online services. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/power-of-adaptive-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is Cloud Identity and its Benefits?]]></title><description><![CDATA[Cloud Identity has emerged as a game-changer in a digitally connected world. Learn how cloud identity simplifies user experiences, enhances security, and enables seamless integration with cloud services. Discover the advantages of centralized identity management and built-in compliance features for organizations of all sizes.]]></description><link>https://www.loginradius.com/blog/identity/what-is-cloud-identity-and-its-benefits/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-cloud-identity-and-its-benefits/</guid><category><![CDATA[cloud identity]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 13 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/06b05871dc2f64c2f74dd0bd88a214fa/7f8e9/cloud-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cloud Identity has emerged as a game-changer in a digitally connected world. Learn how cloud identity simplifies user experiences, enhances security, and enables seamless integration with cloud services. Discover the advantages of centralized identity management and built-in compliance features for organizations of all sizes. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-cloud-identity-and-its-benefits/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Achieving Harmony: Balancing Identity Verification in the Customer Journey]]></title><description><![CDATA[In today's digital landscape, businesses face the challenge of balancing identity verification throughout the customer journey. This blog dives into the complexities and offers actionable strategies to achieve harmony. Find out how to balance security and user experience, fostering trust and driving long-term success.]]></description><link>https://www.loginradius.com/blog/growth/identity-verification-in-customer-journey/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-verification-in-customer-journey/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[ciam authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 07 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a36f721e270df34b51dfc67b7cafe93f/7f8e9/identity-verification.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s digital landscape, businesses face the challenge of balancing identity verification throughout the customer journey. This blog dives into the complexities and offers actionable strategies to achieve harmony. Find out how to balance security and user experience, fostering trust and driving long-term success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-verification-in-customer-journey/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[The Legal Implications of SSO: Privacy, Security, and Compliance]]></title><description><![CDATA[Learn about SSO's privacy concerns, the importance of robust data protection measures, and the need to align SSO implementations with various regulations. Discover how user consent and control play a pivotal role and the significance of implementing strong security measures.]]></description><link>https://www.loginradius.com/blog/identity/legal-implications-of-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/legal-implications-of-sso/</guid><category><![CDATA[single sign on]]></category><category><![CDATA[compliance]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 06 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a428122d0a6b1573e1dddcafcc05b102/7f8e9/sso-legal.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about SSO&apos;s privacy concerns, the importance of robust data protection measures, and the need to align SSO implementations with various regulations. Discover how user consent and control play a pivotal role and the significance of implementing strong security measures. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/legal-implications-of-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Data Privacy Laws for 2023: A Closer Look at 9 Key Regulations]]></title><description><![CDATA[In this digital-first era, data privacy is of paramount importance. Discover the essential data privacy laws for 2023, including GDPR, CCPA, HIPAA, and more. Stay informed, protect sensitive data, and honor individuals' privacy rights with our comprehensive guide.]]></description><link>https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 01 Jun 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/81fa50876abb2cdff6ba7c4d7b47285b/7f8e9/data-privacy-laws.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this digital-first era, data privacy is of paramount importance. Discover the essential data privacy laws for 2023, including GDPR, CCPA, HIPAA, and more. Stay informed, protect sensitive data, and honor individuals&apos; privacy rights with our comprehensive guide. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Login Box Dilemma: Is it Boosting Your Brand or Driving Users Away?]]></title><description><![CDATA[Discover the transformative role of social login in creating seamless user experiences. Explore how the overlooked login box can impact user engagement and retention. Learn how social login simplifies registration, saves time, and leverages user data for personalization. Strike the right balance between convenience and privacy to captivate users and boost your brand.]]></description><link>https://www.loginradius.com/blog/growth/power-of-login-box-for-seamless-user-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/power-of-login-box-for-seamless-user-experience/</guid><category><![CDATA[social login]]></category><category><![CDATA[authentication]]></category><category><![CDATA[compliance]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Mon, 29 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ddf2cf154f8736db648438e613dc88cf/7f8e9/login-box.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Discover the transformative role of social login in creating seamless user experiences. Explore how the overlooked login box can impact user engagement and retention. Learn how social login simplifies registration, saves time, and leverages user data for personalization. Strike the right balance between convenience and privacy to captivate users and boost your brand. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/power-of-login-box-for-seamless-user-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Driving Success Through Customer Onboarding: The Role of Marketing Strategies]]></title><description><![CDATA[Explore the role of marketing in enhancing customer onboarding. Learn practical strategies like personalized communication, clear materials, streamlined experience, and continuous support for successful onboarding.]]></description><link>https://www.loginradius.com/blog/growth/driving-success-through-customer-onboarding/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/driving-success-through-customer-onboarding/</guid><category><![CDATA[customer onboarding]]></category><category><![CDATA[customer experience]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Wed, 24 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b267d9e8f3d799e28446c6dad5c2d5c4/7f8e9/customer-onboarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the role of marketing in enhancing customer onboarding. Learn practical strategies like personalized communication, clear materials, streamlined experience, and continuous support for successful onboarding. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/driving-success-through-customer-onboarding/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Enterprise-Level Security Trends: 5 Things to Know As a CEO]]></title><description><![CDATA[A gradual transition towards a robust security culture signifies the importance of integrating cybersecurity awareness. As a result, many organizations are now building dedicated board-level cybersecurity committees under the CEO’s wing to better address this growing concern.]]></description><link>https://www.loginradius.com/blog/growth/enterprise-level-security-trends/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/enterprise-level-security-trends/</guid><category><![CDATA[enterprise level security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Lucy Manole]]></dc:creator><pubDate>Wed, 17 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/150f72e438b8f2c16dd1dd1a6639f704/7f8e9/ceo-enterprise-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A gradual transition towards a robust security culture signifies the importance of integrating cybersecurity awareness. As a result, many organizations are now building dedicated board-level cybersecurity committees under the CEO’s wing to better address this growing concern. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/enterprise-level-security-trends/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucy Manole&amp;size=100</authorImage></item><item><title><![CDATA[4 Reasons Why SSO Integrations Are a Must-Have For Online Businesses]]></title><description><![CDATA[The primary goal of single sign-on is to enable users to access many applications with just one set of credentials. This is convenient for the user since they won't have to sign in as often, and it's safer for the company because there will be fewer instances of forgotten passwords.]]></description><link>https://www.loginradius.com/blog/identity/sso-integrations-must-for-online-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sso-integrations-must-for-online-businesses/</guid><category><![CDATA[single sign on]]></category><category><![CDATA[identity and access management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Linda Gagaine]]></dc:creator><pubDate>Mon, 15 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bd426ab41b190759181a115f8baf6870/7f8e9/sso-integration.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The primary goal of single sign-on is to enable users to access many applications with just one set of credentials. This is convenient for the user since they won&apos;t have to sign in as often, and it&apos;s safer for the company because there will be fewer instances of forgotten passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sso-integrations-must-for-online-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Linda Gagaine&amp;size=100</authorImage></item><item><title><![CDATA[Consumer vs. Enterprise: Navigating the Dual Nature of Digital Identity]]></title><description><![CDATA[The digital era has given rise to the concept of digital identity, the digital representation of our identity online. Consumer and enterprise identities are commonly used in today's digital landscape. In this blog, we dive into the world of digital identity, uncover the importance of securing it, and explore the differences and similarities between consumer and enterprise identity.]]></description><link>https://www.loginradius.com/blog/identity/the-dual-nature-of-digital-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/the-dual-nature-of-digital-identity/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[consumer identity]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 11 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/449b4df04396754b39d5ad62e989f4eb/7f8e9/dual-nature-dig-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The digital era has given rise to the concept of digital identity, the digital representation of our identity online. Consumer and enterprise identities are commonly used in today&apos;s digital landscape. In this blog, we dive into the world of digital identity, uncover the importance of securing it, and explore the differences and similarities between consumer and enterprise identity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/the-dual-nature-of-digital-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Exploring the Relative Importance of Identity in Today’s Digital Landscape]]></title><description><![CDATA[With the rapid growth of online platforms and digital communication, our identities are more important than ever. Let’s examine how our identities have evolved in the digital age and explore their relative role in shaping our online experiences.]]></description><link>https://www.loginradius.com/blog/growth/the-relative-importance-of-customer-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/the-relative-importance-of-customer-identity/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 05 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b17b0b738c150e032b72c912225a1c13/7f8e9/importance-of-customer-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the rapid growth of online platforms and digital communication, our identities are more important than ever. Let’s examine how our identities have evolved in the digital age and explore their relative role in shaping our online experiences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/the-relative-importance-of-customer-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Releases Consumer Identity Trend Report 2023, Highlights The Future of Customer Identity]]></title><description><![CDATA[LoginRadius has conducted a comprehensive analysis of its global customer base over the past year. The result is an annual report on Consumer Identity Trends for 2023, which showcases over 40 unique insights and observations.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-report-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-report-2023/</guid><category><![CDATA[industry-news]]></category><category><![CDATA[consumer-identity]]></category><category><![CDATA[identity-trends]]></category><category><![CDATA[digital-identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 04 May 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/64adf4e88539c003872413c384a06e20/7f8e9/consumer-identity-trends-report-2023.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius has conducted a comprehensive analysis of its global customer base over the past year. The result is an annual report on Consumer Identity Trends for 2023, which showcases over 40 unique insights and observations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-report-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Unleash the Power of Your Identity Projects: A Guide to Maximizing ROI]]></title><description><![CDATA[In today's digital age, managing digital identities securely is critical for businesses across various industries. Implementing an identity project can be costly and time-consuming, making it essential to maximize ROI. By defining clear goals, and monitoring performances, businesses can unleash the full potential of their identity projects.]]></description><link>https://www.loginradius.com/blog/growth/maximize-roi-of-your-identity-projects/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/maximize-roi-of-your-identity-projects/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[roi]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 25 Apr 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/344be004ed075720913813aa7909cfe5/7f8e9/maximize-roi.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s digital age, managing digital identities securely is critical for businesses across various industries. Implementing an identity project can be costly and time-consuming, making it essential to maximize ROI. By defining clear goals, and monitoring performances, businesses can unleash the full potential of their identity projects. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/maximize-roi-of-your-identity-projects/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Digital Identity: The Future of Successful Retail Operations]]></title><description><![CDATA[With the rise of e-commerce, mobile shopping, and social media, retailers can use digital identity to personalize the customer experience, optimize marketing efforts, and drive sales. Let’s uncover the aspects of digital identity and how it thrives overall retail success.]]></description><link>https://www.loginradius.com/blog/growth/how-digital-identity-unlock-success-in-retail/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-digital-identity-unlock-success-in-retail/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[ecommerce]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 19 Apr 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eac528eb454913e57350e17b7247e77e/7f8e9/dig-identity-retail.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the rise of e-commerce, mobile shopping, and social media, retailers can use digital identity to personalize the customer experience, optimize marketing efforts, and drive sales. Let’s uncover the aspects of digital identity and how it thrives overall retail success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-digital-identity-unlock-success-in-retail/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is a Password Vault and How Does it Work?]]></title><description><![CDATA[One of the most significant security concerns is using weak passwords or the same password across multiple accounts, making it easy for hackers to gain unauthorized access to sensitive information. To address these issues, password vaults have become a popular digital identity solution for securely storing passwords.]]></description><link>https://www.loginradius.com/blog/identity/what-is-password-vault-how-does-it-work/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-password-vault-how-does-it-work/</guid><category><![CDATA[robust security]]></category><category><![CDATA[password management]]></category><category><![CDATA[data privacy]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Wed, 19 Apr 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ada4413898b5488023a6130f69cc1130/7f8e9/password-vault.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; One of the most significant security concerns is using weak passwords or the same password across multiple accounts, making it easy for hackers to gain unauthorized access to sensitive information. To address these issues, password vaults have become a popular digital identity solution for securely storing passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-password-vault-how-does-it-work/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How a Culture of Identity Governance Empowers Digital Transformation?]]></title><description><![CDATA[By prioritizing identity governance as a critical aspect of their digital transformation strategy, organizations can ensure that they are effectively managing user identities and access, both of which are critical to the success of any digital initiative. Here’s a deeper look at the aspects of leveraging identity governance.]]></description><link>https://www.loginradius.com/blog/identity/identity-governance-unlocks-digital-transformation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-governance-unlocks-digital-transformation/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[identity governance]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 11 Apr 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ad86307292ebf1987c6b65b0962fa3c0/7f8e9/digital-transformation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; By prioritizing identity governance as a critical aspect of their digital transformation strategy, organizations can ensure that they are effectively managing user identities and access, both of which are critical to the success of any digital initiative. Here’s a deeper look at the aspects of leveraging identity governance. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-governance-unlocks-digital-transformation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[How Can CIAM Help Businesses Build Trust And Loyalty?]]></title><description><![CDATA[By implementing CIAM solutions, businesses can provide customers with a personalized and secure experience while improving operational efficiency. Let’s figure out how companies can leverage the true potential of a robust CIAM to build trust and loyalty.]]></description><link>https://www.loginradius.com/blog/growth/ciam-improves-customer-trust-and-loyalty/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-improves-customer-trust-and-loyalty/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[compliance]]></category><category><![CDATA[sso]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 05 Apr 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/21ba6f42fcaf4ff8855591cb2412e711/7f8e9/customer-trust.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; By implementing CIAM solutions, businesses can provide customers with a personalized and secure experience while improving operational efficiency. Let’s figure out how companies can leverage the true potential of a robust CIAM to build trust and loyalty. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-improves-customer-trust-and-loyalty/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[5 Reasons Why a Strong Customer Identity Strategy Can Benefit Your Business]]></title><description><![CDATA[Whether deep consumer insights or delivering seamless and secure customer experiences, an identity management solution could help businesses stay ahead of the curve. Let’s uncover some of the top reasons your business needs an identity strategy.]]></description><link>https://www.loginradius.com/blog/growth/reasons-business-needs-customer-identity-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/reasons-business-needs-customer-identity-strategy/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Wed, 22 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b1fcd2cb003776fb955350320d266f17/7f8e9/customer-idntity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether deep consumer insights or delivering seamless and secure customer experiences, an identity management solution could help businesses stay ahead of the curve. Let’s uncover some of the top reasons your business needs an identity strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/reasons-business-needs-customer-identity-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Simplifying CX: How Passwordless Authentication Reduces Friction for Customers?]]></title><description><![CDATA[The traditional password-based authentication methods can frustrate customers, leading to poor customer experience (CX). Since a bit of friction in the onboarding process could force customers to switch. And passwordless authentication is emerging as a solution to address these pain points and enhance CX since a seamless customer journey is what every user is looking for.]]></description><link>https://www.loginradius.com/blog/growth/passwordless-auth-reduces-pain-points-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/passwordless-auth-reduces-pain-points-cx/</guid><category><![CDATA[data security]]></category><category><![CDATA[passwordless authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 17 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/707c24135bf15a0b28e2816e1e75e491/7f8e9/passwordless-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The traditional password-based authentication methods can frustrate customers, leading to poor customer experience (CX). Since a bit of friction in the onboarding process could force customers to switch. And passwordless authentication is emerging as a solution to address these pain points and enhance CX since a seamless customer journey is what every user is looking for. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/passwordless-auth-reduces-pain-points-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Securing the Digital Frontier: The Power of AI in Next-Gen CIAM]]></title><description><![CDATA[CIAM platforms are utilizing the power of artificial intelligence to give customers a personalized experience. This blog gives a walkthrough of some of the key roles of AI in CIAM, including personalization, security and advanced analytics.]]></description><link>https://www.loginradius.com/blog/identity/securing-digital-frontier-using-ai/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/securing-digital-frontier-using-ai/</guid><category><![CDATA[artificial intelligence]]></category><category><![CDATA[compliance]]></category><category><![CDATA[ciam]]></category><dc:creator><![CDATA[Zach Norton]]></dc:creator><pubDate>Fri, 17 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f2c2eca9497e3a0581176c3dc4fb91f2/7f8e9/power-of-ai.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIAM platforms are utilizing the power of artificial intelligence to give customers a personalized experience. This blog gives a walkthrough of some of the key roles of AI in CIAM, including personalization, security and advanced analytics. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/securing-digital-frontier-using-ai/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zach Norton&amp;size=100</authorImage></item><item><title><![CDATA[Replatforming 101: Everything You Need to Know]]></title><description><![CDATA[In today's rapidly evolving digital landscape, businesses must keep pace with the latest technology to remain competitive. One way to do this is through re-platforming or migrating from an outdated platform to a newer one, often in the cloud. Let’s have a look at the aspects associated with re-platforming.]]></description><link>https://www.loginradius.com/blog/identity/what-is-replatforming/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-replatforming/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[cloud migration]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 15 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cda2c5065ea9e6fd9653add72869e4e1/7f8e9/replatforming.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today&apos;s rapidly evolving digital landscape, businesses must keep pace with the latest technology to remain competitive. One way to do this is through re-platforming or migrating from an outdated platform to a newer one, often in the cloud. Let’s have a look at the aspects associated with re-platforming. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-replatforming/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Crucial Role of Security and CX in Providing Robust Authentication for Merchants]]></title><description><![CDATA[Customers expect great experiences backed with robust security while interacting with a brand online. Hence, businesses must cater to them with the appropriate services by leveraging a robust authentication mechanism. Let’s have a look at some of the authentication benefits for merchants.]]></description><link>https://www.loginradius.com/blog/growth/driving-merchant-growth-robust-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/driving-merchant-growth-robust-authentication/</guid><category><![CDATA[online shopping]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 09 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/217fcdc9bb86742a3e1966af93869792/c0524/robust-authntcation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customers expect great experiences backed with robust security while interacting with a brand online. Hence, businesses must cater to them with the appropriate services by leveraging a robust authentication mechanism. Let’s have a look at some of the authentication benefits for merchants. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/driving-merchant-growth-robust-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Best Practices for Username and Password Authentication]]></title><description><![CDATA[While the username and password authentication method is convenient and widely used, it is also vulnerable to attacks and breaches, making it essential for organizations to implement best practices for secure authentication. Let’s discuss the best practices for username and password authentication to ensure the highest level of security.]]></description><link>https://www.loginradius.com/blog/identity/best-practices-username-password-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-practices-username-password-authentication/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[user management]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 09 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b4d3eeeda96559ebc014f5fb7ddb5a3/7f8e9/username-pswrd.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While the username and password authentication method is convenient and widely used, it is also vulnerable to attacks and breaches, making it essential for organizations to implement best practices for secure authentication. Let’s discuss the best practices for username and password authentication to ensure the highest level of security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-practices-username-password-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Ultimate Guide to Choosing the Right CIAM Solution]]></title><description><![CDATA[With the market for CIAM solutions rapidly evolving, choosing the right one for your organization's unique needs can take time. Hence, you must analyze the entire CIAM landscape, and your business needs to decide wisely.]]></description><link>https://www.loginradius.com/blog/identity/guide-choosing-right-ciam-solution/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/guide-choosing-right-ciam-solution/</guid><category><![CDATA[compliance]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[data privacy]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 06 Mar 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/818186b7fe84696bb6cf7d6527704554/7f8e9/right-ciam-sol.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the market for CIAM solutions rapidly evolving, choosing the right one for your organization&apos;s unique needs can take time. Hence, you must analyze the entire CIAM landscape, and your business needs to decide wisely. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/guide-choosing-right-ciam-solution/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Should Social Login Be a Part of Your E-Commerce Marketing?]]></title><description><![CDATA[Social login is a seamless authentication process that allows users to sign in to an e-commerce site using their existing social media credentials, such as Facebook, Google, Twitter, and LinkedIn. By offering social login options, e-commerce sites can offer customers a more personalized, streamlined, and engaging shopping experience.]]></description><link>https://www.loginradius.com/blog/growth/boosting-ecommerce-marketing-social-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/boosting-ecommerce-marketing-social-login/</guid><category><![CDATA[ecommerce]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 28 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/582c82254da6b037b9e04b9cfb28556f/7f8e9/ecommerce-mrktng.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social login is a seamless authentication process that allows users to sign in to an e-commerce site using their existing social media credentials, such as Facebook, Google, Twitter, and LinkedIn. By offering social login options, e-commerce sites can offer customers a more personalized, streamlined, and engaging shopping experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/boosting-ecommerce-marketing-social-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How to Use Identity Management at Every Stage of the Customer Journey?]]></title><description><![CDATA[While leveraging personalization at every stage of the customer journey can enhance customer experience and unwind great opportunities, it also ensures returning customers and more referrals. This blog highlights the role of identity management throughout the customer journey and how it helps businesses streamline user experience backed with security.]]></description><link>https://www.loginradius.com/blog/identity/seamless-customer-journey-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/seamless-customer-journey-identity-management/</guid><category><![CDATA[identity management]]></category><category><![CDATA[progressive profiling]]></category><category><![CDATA[passwordless login]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 28 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/633fc4b10f8b92c6057aa6ad45bbfef5/7f8e9/identity-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While leveraging personalization at every stage of the customer journey can enhance customer experience and unwind great opportunities, it also ensures returning customers and more referrals. This blog highlights the role of identity management throughout the customer journey and how it helps businesses streamline user experience backed with security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/seamless-customer-journey-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Target Your Ideal Customer with User Profile Management?]]></title><description><![CDATA[Targeting the right audience isn’t a piece of cake. It requires much effort, detailed user insights from user profiles, and research to develop a plan to increase engagement. This blog uncovers the aspects of user profile management with CIAM and how businesses can navigate their success journey by targeting the right audience.]]></description><link>https://www.loginradius.com/blog/growth/finding-ideal-customer-user-profile-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/finding-ideal-customer-user-profile-management/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 22 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7bd0cbf13282136bd931f238b505b2e5/7f8e9/profile-mangemnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Targeting the right audience isn’t a piece of cake. It requires much effort, detailed user insights from user profiles, and research to develop a plan to increase engagement. This blog uncovers the aspects of user profile management with CIAM and how businesses can navigate their success journey by targeting the right audience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/finding-ideal-customer-user-profile-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Future is Now: Why Product Marketers Must Embrace CIAM Login]]></title><description><![CDATA[When we talk about efficient marketing, the role of CIAM login can’t be overlooked. Whether it’s valuable user insights to offer personalized experiences or delivering seamless authentication, marketers love the companionship of a robust CIAM.]]></description><link>https://www.loginradius.com/blog/growth/product-marketers-ciam-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/product-marketers-ciam-login/</guid><category><![CDATA[login authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 16 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/53b9427e9cffe51e7eba50bc607f0e79/7f8e9/prod-marketer.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When we talk about efficient marketing, the role of CIAM login can’t be overlooked. Whether it’s valuable user insights to offer personalized experiences or delivering seamless authentication, marketers love the companionship of a robust CIAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/product-marketers-ciam-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Protecting Your Cloud Data: The Power of SaaS Security and IAM Governance]]></title><description><![CDATA[Since organizations today have thousands and even millions of users logging simultaneously into their accounts, ensuring security at every end-point becomes an uphill battle. Hence, a robust identity and access management system becomes more crucial than ever. Let’s glance at some aspects of securing SaaS environments by incorporating a robust identity and access management solution.]]></description><link>https://www.loginradius.com/blog/identity/saas-security-iam-effective-governance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/saas-security-iam-effective-governance/</guid><category><![CDATA[saas]]></category><category><![CDATA[identity-governance]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 16 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/27f78bcfa12ccd905db45c3bc3c4c3d7/7f8e9/saas-secure.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Since organizations today have thousands and even millions of users logging simultaneously into their accounts, ensuring security at every end-point becomes an uphill battle. Hence, a robust identity and access management system becomes more crucial than ever. Let’s glance at some aspects of securing SaaS environments by incorporating a robust identity and access management solution. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/saas-security-iam-effective-governance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Rise of Account Creation Fraud: What You Need to Know]]></title><description><![CDATA[Account creation fraud, sometimes called new account fraud, is a fraud where cybercriminals create fake accounts of users and exploit their details. And these frauds are often carried out by exploiting the stolen identity of users or through a loophole in a platform's entire identity management system.]]></description><link>https://www.loginradius.com/blog/identity/what-is-account-creation-fraud/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-account-creation-fraud/</guid><category><![CDATA[account fraud]]></category><category><![CDATA[passwordless authentication]]></category><category><![CDATA[risk based authentication]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Wed, 15 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bfd04e7cd60275172bcbe0ebcef8d61b/7f8e9/account-fraud.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Account creation fraud, sometimes called new account fraud, is a fraud where cybercriminals create fake accounts of users and exploit their details. And these frauds are often carried out by exploiting the stolen identity of users or through a loophole in a platform&apos;s entire identity management system. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-account-creation-fraud/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[The Critical Role of SSO in Reshaping Digital Marketing Landscape]]></title><description><![CDATA[With SSO, enterprises can understand their target audience's needs, preferences, and behavior when they land on their platform for the first time. And this helps them in creating winning digital marketing campaigns to foster growth.]]></description><link>https://www.loginradius.com/blog/growth/role-sso-in-digital-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/role-sso-in-digital-marketing/</guid><category><![CDATA[sso]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[customer retention]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 10 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/593a210b2040a162e3d9ed3605ed2426/7f8e9/sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With SSO, enterprises can understand their target audience&apos;s needs, preferences, and behavior when they land on their platform for the first time. And this helps them in creating winning digital marketing campaigns to foster growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/role-sso-in-digital-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Why Direct-to-Consumer (D2C) Businesses Must Take A Strategic Approach To CIAM?]]></title><description><![CDATA[The greatest value for direct-to-consumer companies comes from creating a valuable, seamless experience. In this blog we will discuss how CIAM allows D2C companies to improve the customer journey directly.]]></description><link>https://www.loginradius.com/blog/identity/d2c-brands-utilize-ciam-for-growth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/d2c-brands-utilize-ciam-for-growth/</guid><category><![CDATA[direct to consumer]]></category><category><![CDATA[authentication]]></category><category><![CDATA[ciam]]></category><dc:creator><![CDATA[Nicholas Woodward]]></dc:creator><pubDate>Fri, 10 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b78b4dc25b811cbceebfe8079215ca48/7f8e9/d2c.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The greatest value for direct-to-consumer companies comes from creating a valuable, seamless experience. In this blog we will discuss how CIAM allows D2C companies to improve the customer journey directly. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/d2c-brands-utilize-ciam-for-growth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Nicholas Woodward&amp;size=100</authorImage></item><item><title><![CDATA[What are Self-Sovereign Identities?]]></title><description><![CDATA[Today, we take a look at what self-sovereign identity is. And although it's easy to get confused with all the buzzwords floating around, incredibly, when many of them are hyped in the media, self-sovereign identity is an essential concept in the evolving landscape of digital identities.]]></description><link>https://www.loginradius.com/blog/identity/what-are-self-sovereign-identities/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-are-self-sovereign-identities/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[self sovereign id]]></category><category><![CDATA[customer data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 03 Feb 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/588587ffb3fdba8163ce9a14713e6ded/7f8e9/sovereign-ids.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, we take a look at what self-sovereign identity is. And although it&apos;s easy to get confused with all the buzzwords floating around, incredibly, when many of them are hyped in the media, self-sovereign identity is an essential concept in the evolving landscape of digital identities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-are-self-sovereign-identities/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius is Now Great Place to Work-Certified in India]]></title><description><![CDATA[LoginRadius has always fostered a positive work culture and is excited to officially become ‘Great Place to Work-Certified.’ This certification is a natural move for us as it puts us on the international recognition stage.  Let’s look closely at the overall journey of becoming the best.]]></description><link>https://www.loginradius.com/blog/growth/loginradius-certified-great-place-to-work/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/loginradius-certified-great-place-to-work/</guid><dc:creator><![CDATA[Pankaj Sharma]]></dc:creator><pubDate>Tue, 31 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/78c0039cc785551b318b555e2ed2e484/7f8e9/gptw-blog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius has always fostered a positive work culture and is excited to officially become ‘Great Place to Work-Certified.’ This certification is a natural move for us as it puts us on the international recognition stage.  Let’s look closely at the overall journey of becoming the best. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/loginradius-certified-great-place-to-work/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Pankaj Sharma&amp;size=100</authorImage></item><item><title><![CDATA[7 Uncommon Cyber Attacks in 2023: Why Your Organization Needs To Be Ready  For The Worst-Case Scenarios]]></title><description><![CDATA[Cybercriminals are resourceful and innovative creatures who constantly develop new ways to exploit businesses and customer information to reap benefits. While every organization is aware of the potential threats, they are equally unaware of the uncommon attacks that could severely impact their overall cybersecurity posture.]]></description><link>https://www.loginradius.com/blog/identity/7-uncommon-cyberattacks-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/7-uncommon-cyberattacks-2023/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 27 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ed8d77d1d0450fe730fb6bd3078803a/7f8e9/uncommon.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybercriminals are resourceful and innovative creatures who constantly develop new ways to exploit businesses and customer information to reap benefits. While every organization is aware of the potential threats, they are equally unaware of the uncommon attacks that could severely impact their overall cybersecurity posture. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/7-uncommon-cyberattacks-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[How Important is Customer Health Scoring for SaaS Business?]]></title><description><![CDATA[A customer health score is an organization's metric to determine whether customers are healthy or at risk of churn. Based on the score of the individual customer, retention strategies are implemented.]]></description><link>https://www.loginradius.com/blog/growth/importance-customer-health-scoring-saas-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/importance-customer-health-scoring-saas-businesses/</guid><category><![CDATA[saas]]></category><category><![CDATA[customer retention]]></category><category><![CDATA[customer behavior]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Thu, 19 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/77eb71373c418f20962a5c8b188c405b/58556/saas-score.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A customer health score is an organization&apos;s metric to determine whether customers are healthy or at risk of churn. Based on the score of the individual customer, retention strategies are implemented. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/importance-customer-health-scoring-saas-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity Modernization: What Is It & Why Should You Care?]]></title><description><![CDATA[Identity modernization could be defined as shifting from managing identities through on-premises identity providers to a cloud-based identity management solution. Moreover, it could also be a shift from one cloud to multiple clouds. Read this insightful post to understand more about identity modernization benefits for modern businesses.]]></description><link>https://www.loginradius.com/blog/identity/what-is-identity-modernization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-identity-modernization/</guid><category><![CDATA[Identity management]]></category><category><![CDATA[identity modernization]]></category><category><![CDATA[identity security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 19 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a846ee8a1af9f413faecea2219467669/7f8e9/id-mod.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity modernization could be defined as shifting from managing identities through on-premises identity providers to a cloud-based identity management solution. Moreover, it could also be a shift from one cloud to multiple clouds. Read this insightful post to understand more about identity modernization benefits for modern businesses. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-identity-modernization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Launches a CLI for Enterprise Dashboard]]></title><description><![CDATA[We are happy to announce that we have launched LoginRadius CLI for enterprise dashboard.]]></description><link>https://www.loginradius.com/blog/engineering/loginradius-launches-cli-enterprise-dashboard/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/loginradius-launches-cli-enterprise-dashboard/</guid><category><![CDATA[enterprise]]></category><category><![CDATA[admin console]]></category><category><![CDATA[developers]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 16 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ffb34d9b9eaf61b02309e5df03db1363/58556/cli-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We are happy to announce that we have launched LoginRadius CLI for enterprise dashboard. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/loginradius-launches-cli-enterprise-dashboard/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[An Exclusive CIAM Benefit: The Role of Access Management in Cost Optimization]]></title><description><![CDATA[Whether we talk about delivering a seamless authentication experience or reinforcing the overall business and customer identity security, a CIAM solution leaves no stone unturned in scaling business growth. This blog explains the aspects of leveraging the role of a CIAM’s access management in cost optimization.]]></description><link>https://www.loginradius.com/blog/growth/ciam-minimizes-expenses-access-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-minimizes-expenses-access-management/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 13 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f843ed6c86c8cc293a22a12bd24b1dc7/a3e81/access-managemt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether we talk about delivering a seamless authentication experience or reinforcing the overall business and customer identity security, a CIAM solution leaves no stone unturned in scaling business growth. This blog explains the aspects of leveraging the role of a CIAM’s access management in cost optimization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-minimizes-expenses-access-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Lot Can Happen In The Cloud: Multi-Cloud Environment and its Optimization Challenges]]></title><description><![CDATA[Although some features of the cloud are pretty attractive, there exist some that aren’t so attractive but are add-on features that make it highly complex to manage the cloud regularly.  Let’s uncover some optimization aspects of multi-cloud environments and the challenges that can help businesses plan their cloud adoption smartly.]]></description><link>https://www.loginradius.com/blog/identity/multi-cloud-environment-optmization-challenges/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/multi-cloud-environment-optmization-challenges/</guid><category><![CDATA[multi cloud]]></category><category><![CDATA[cloud cost optimization"]]></category><category><![CDATA[on prem]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 13 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0c9e16c99ecdeb7c846311eb220eeaf9/a3e81/cloud-multi.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Although some features of the cloud are pretty attractive, there exist some that aren’t so attractive but are add-on features that make it highly complex to manage the cloud regularly.  Let’s uncover some optimization aspects of multi-cloud environments and the challenges that can help businesses plan their cloud adoption smartly. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/multi-cloud-environment-optmization-challenges/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Can Security and User Experience Co-Exist in the Authenticating and Authorizing Space?]]></title><description><![CDATA[Businesses have leveraged a robust customer identity and access management (CIAM) solution for years to secure customer identities and eventually deliver a seamless user experience across multiple touchpoints. Let’s figure out how a CIAM does wonders for a business while creating a perfect user experience and security harmony.]]></description><link>https://www.loginradius.com/blog/identity/security-ux-can-coexist/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/security-ux-can-coexist/</guid><category><![CDATA[security]]></category><category><![CDATA[user experience]]></category><category><![CDATA[customer identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 12 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e7752e1f2f9965d99acdb93548e68c40/a3e81/ux-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses have leveraged a robust customer identity and access management (CIAM) solution for years to secure customer identities and eventually deliver a seamless user experience across multiple touchpoints. Let’s figure out how a CIAM does wonders for a business while creating a perfect user experience and security harmony. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/security-ux-can-coexist/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Business On The Move: How Just-in-Time Migrations Are Making Smooth CIAM Transitions]]></title><description><![CDATA[Just-in-time migrations are the latest buzz in the customer identity and access management (CIAM) industry. While most organizations still use bulk migrations, a growing segment of cloud services is implementing just-in-time (JIT).]]></description><link>https://www.loginradius.com/blog/identity/just-in-time-migrations-ciam-transitions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/just-in-time-migrations-ciam-transitions/</guid><category><![CDATA[ciam]]></category><category><![CDATA[data migration]]></category><category><![CDATA[identity import manager]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Wed, 11 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1980e46e5df901a6356adaf9bc69087d/7f8e9/ciam-intime.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Just-in-time migrations are the latest buzz in the customer identity and access management (CIAM) industry. While most organizations still use bulk migrations, a growing segment of cloud services is implementing just-in-time (JIT). &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/just-in-time-migrations-ciam-transitions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Cyber Insurance in 2023: Takeaways For The Future And How To Prepare For It]]></title><description><![CDATA[As cyber risks continue to evolve and increase, it is no surprise that cyber insurance is becoming one of the fastest-growing insurance products in the market. Learn how it will shape the security space in 2023.]]></description><link>https://www.loginradius.com/blog/growth/cyberinsurance-2023-insurers-adapt-survive/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/cyberinsurance-2023-insurers-adapt-survive/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[cyberinsurance]]></category><category><![CDATA[risk management]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 06 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b2d206456f47aa60572eba8e8b79dd20/7f8e9/cyber-insurance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As cyber risks continue to evolve and increase, it is no surprise that cyber insurance is becoming one of the fastest-growing insurance products in the market. Learn how it will shape the security space in 2023. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/cyberinsurance-2023-insurers-adapt-survive/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[3 Digital Onboarding Trends To Watch In 2023 (And What You Can Do About It Now)]]></title><description><![CDATA[Digital onboarding plays a crucial role in enhancing user experience. This blog will help you understand what digital onboarding is, how it impacts conversions, and the trends in digital onboarding that will shape the future of identity verification.]]></description><link>https://www.loginradius.com/blog/identity/3-digital-onboarding-trends-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/3-digital-onboarding-trends-2023/</guid><category><![CDATA[user onboarding]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[omnichannel]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 06 Jan 2023 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9cb69b628678d1e0eaf0babc01566dc/7f8e9/digi-onboard.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital onboarding plays a crucial role in enhancing user experience. This blog will help you understand what digital onboarding is, how it impacts conversions, and the trends in digital onboarding that will shape the future of identity verification. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/3-digital-onboarding-trends-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Look Back At Our 20 Top Performing Blogs in 2022]]></title><description><![CDATA[In 2022, we continued to share valuable posts that uphold our mission to help companies manage and secure customer identities. We’re wrapping up the year by compiling a list of our top-performing blogs of 2022.]]></description><link>https://www.loginradius.com/blog/identity/top-readers-blogs-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/top-readers-blogs-2022/</guid><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 22 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3faab26c7374af8e8d13709e6f62f6a0/7f8e9/top-blog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In 2022, we continued to share valuable posts that uphold our mission to help companies manage and secure customer identities. We’re wrapping up the year by compiling a list of our top-performing blogs of 2022. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/top-readers-blogs-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How To Plan Your CIAM Budget In A Recession As We Look Ahead Towards 2023?]]></title><description><![CDATA[The key to optimizing and protecting your CIAM budget is to be clear and sure about everything that adds value to your organization. Here are some tips that can help you plan your CIAM budget smartly for 2023 on the declining global economy.]]></description><link>https://www.loginradius.com/blog/growth/ciam-budget-2023-recession/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-budget-2023-recession/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 21 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c3c6fd00576a6765b55debec893475f2/7f8e9/budget.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The key to optimizing and protecting your CIAM budget is to be clear and sure about everything that adds value to your organization. Here are some tips that can help you plan your CIAM budget smartly for 2023 on the declining global economy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-budget-2023-recession/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[6 Tips to Prevent Accidental Data Exposure Within Your Company]]></title><description><![CDATA[The threat of data exposure is real. With the amount of sensitive personal information that companies are collecting and storing, accidental data exposure can be devastating to a company's reputation. Here are some ways to keep your organization's critical data safe.]]></description><link>https://www.loginradius.com/blog/identity/prevent-accidental-data-exposure-company/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/prevent-accidental-data-exposure-company/</guid><category><![CDATA[data leak]]></category><category><![CDATA[customer data]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 21 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3fc53fffb3ce3597534fa0b0c59aba12/7f8e9/data-exposure.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The threat of data exposure is real. With the amount of sensitive personal information that companies are collecting and storing, accidental data exposure can be devastating to a company&apos;s reputation. Here are some ways to keep your organization&apos;s critical data safe. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/prevent-accidental-data-exposure-company/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Your Digital Identity Is Changing - So, What Does It Mean For Customer Experience?]]></title><description><![CDATA[Now, more than ever, customer experience is baked into every business. That means that as a business owner, you need to deliver great digital experiences and customer interactions every time. This blog covers some of the important aspects of an effective digital strategy.]]></description><link>https://www.loginradius.com/blog/growth/evolution-digital-identity-better-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/evolution-digital-identity-better-cx/</guid><category><![CDATA[digital id]]></category><category><![CDATA[cx]]></category><category><![CDATA[customer identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 16 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ae78477f392331f52ed29970780b8762/7f8e9/digital.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Now, more than ever, customer experience is baked into every business. That means that as a business owner, you need to deliver great digital experiences and customer interactions every time. This blog covers some of the important aspects of an effective digital strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/evolution-digital-identity-better-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Top Priorities for Customer IAM Leaders in 2023 and How to Prepare]]></title><description><![CDATA[As we approach the next decade, it is worth looking at what technology will bring to the table and how it can impact the realm of intelligent authentication. Let’s look at some of the top priorities of CIAM leaders in 2023.]]></description><link>https://www.loginradius.com/blog/identity/things-customer-iam-leaders-prioritize-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/things-customer-iam-leaders-prioritize-2023/</guid><category><![CDATA[ciam]]></category><category><![CDATA[authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 16 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f0e40522b8a31e33bfa79afaeb4a1291/7f8e9/ciam-leaders.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As we approach the next decade, it is worth looking at what technology will bring to the table and how it can impact the realm of intelligent authentication. Let’s look at some of the top priorities of CIAM leaders in 2023. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/things-customer-iam-leaders-prioritize-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Electronic Theatre Controls: A LoginRadius Customer Success Story]]></title><description><![CDATA[ETC now manages user identity centrally with LoginRadius CIAM. This allows the team to create and manage unified consumer profiles that can be used throughout the business’ entire digital ecosystem.]]></description><link>https://www.loginradius.com/blog/identity/etc-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/etc-loginradius-customer-success-story/</guid><category><![CDATA[customer success]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Saikiran Babladi]]></dc:creator><pubDate>Thu, 08 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/234baebef4a8cbdcfbf897ff2e4be42b/7f8e9/etc-connect.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; ETC now manages user identity centrally with LoginRadius CIAM. This allows the team to create and manage unified consumer profiles that can be used throughout the business’ entire digital ecosystem. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/etc-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Saikiran Babladi&amp;size=100</authorImage></item><item><title><![CDATA[Distributed Multi-Cloud Identity Management and Its Endless Business Benefits]]></title><description><![CDATA[Distributed identity management is a portal for combining cloud resources, services, and digital business applications. You can give your customers a robust customer experience by leveraging a distributed multi-cloud identity to ensure robust security and excellent customer experience.]]></description><link>https://www.loginradius.com/blog/identity/what-is-distributed-multi-cloud-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-distributed-multi-cloud-identity-management/</guid><category><![CDATA[multi cloud]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cloud security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 06 Dec 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b50a84084cba9fe737a79cef8f5e009e/7f8e9/multi-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Distributed identity management is a portal for combining cloud resources, services, and digital business applications. You can give your customers a robust customer experience by leveraging a distributed multi-cloud identity to ensure robust security and excellent customer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-distributed-multi-cloud-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Your Ultimate Guide To Master CRO While Taking Care of Consumer Data Security]]></title><description><![CDATA[Modern consumer authentication methods have made the buying process stress-free and conducive for consumers. This blog explains how they play a huge role in your conversion rate optimization and improve customer relationships.]]></description><link>https://www.loginradius.com/blog/growth/master-cro-customer-data/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/master-cro-customer-data/</guid><category><![CDATA[authentication]]></category><category><![CDATA[roi]]></category><category><![CDATA[customer data]]></category><dc:creator><![CDATA[Steven Macdonald]]></dc:creator><pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/96d090c97e8b13702b64726cddff9f5b/7f8e9/cro-customer.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Modern consumer authentication methods have made the buying process stress-free and conducive for consumers. This blog explains how they play a huge role in your conversion rate optimization and improve customer relationships. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/master-cro-customer-data/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Steven Macdonald&amp;size=100</authorImage></item><item><title><![CDATA[How The Age Of Smart Credentials Is Rewriting The Rules For Physical Verification?]]></title><description><![CDATA[As technology advances, the need for national standards and interoperable applications raises the stakes for physical verification of identity. Smart credentials may offer better solutions to today's problems, but only if proper safeguarding is in place.]]></description><link>https://www.loginradius.com/blog/identity/smart-credentials-raising-bar-physical-ids/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/smart-credentials-raising-bar-physical-ids/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[smart credentials]]></category><category><![CDATA[iot]]></category><category><![CDATA[identity verification]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/872b5e50188e32995d36890f68d131e8/7f8e9/smart-credentials.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As technology advances, the need for national standards and interoperable applications raises the stakes for physical verification of identity. Smart credentials may offer better solutions to today&apos;s problems, but only if proper safeguarding is in place. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/smart-credentials-raising-bar-physical-ids/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?]]></title><description><![CDATA[When a business has a disaster, its recovery falls into two categories: incident response and disaster recovery. This blog offers an overview of the most important aspects of each, as well as the reasons you might choose one over the other.]]></description><link>https://www.loginradius.com/blog/identity/difference-between-incident-response-disaster-recovery/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/difference-between-incident-response-disaster-recovery/</guid><category><![CDATA[incident response]]></category><category><![CDATA[disaster recovery]]></category><category><![CDATA[enterprise security]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 25 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ba663be31d9e42bc427f8b58657b453/7f8e9/disaster-recovery.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When a business has a disaster, its recovery falls into two categories: incident response and disaster recovery. This blog offers an overview of the most important aspects of each, as well as the reasons you might choose one over the other. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/difference-between-incident-response-disaster-recovery/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[10 Ways To Keep Your Business Safe On Black Friday and Cyber Monday]]></title><description><![CDATA[Black Friday and Cyber Monday mean big deals, but they also mean big risks. Take control of your security and privacy with these  tips to keep your business safe for cyber attacks.]]></description><link>https://www.loginradius.com/blog/identity/10-black-friday-cyber-monday-tips-for-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/10-black-friday-cyber-monday-tips-for-businesses/</guid><category><![CDATA[online shopping]]></category><category><![CDATA[online security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 23 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a760f367d9eaefaacc193a35245d56a6/7f8e9/cyber-monday.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Black Friday and Cyber Monday mean big deals, but they also mean big risks. Take control of your security and privacy with these  tips to keep your business safe for cyber attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/10-black-friday-cyber-monday-tips-for-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Inside the Business of Digital Privacy: A Profitable Opportunity]]></title><description><![CDATA[Digital privacy is the key that drives business growth as it offers valuable insights to empower businesses to provide personalized experiences to users. This blog explores the aspects of leveraging digital privacy and how businesses can stay ahead of the curve.]]></description><link>https://www.loginradius.com/blog/growth/inside-business-of-digital-privacy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/inside-business-of-digital-privacy/</guid><category><![CDATA[roi]]></category><category><![CDATA[digital privacy]]></category><category><![CDATA[customer trust]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 18 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9454c6e2fb5dd5106069079d1f2f6ac/7f8e9/digi-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital privacy is the key that drives business growth as it offers valuable insights to empower businesses to provide personalized experiences to users. This blog explores the aspects of leveraging digital privacy and how businesses can stay ahead of the curve. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/inside-business-of-digital-privacy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Customer Experience is About to Get Even Better With Passive Authentication]]></title><description><![CDATA[Passive authentication lets companies respond to the need for speed and convenience by making authentication seamless and automatic, thus avoiding security risks. Making the shift from active to passive can be a delicate process. But when it's done right, the benefits are immense.]]></description><link>https://www.loginradius.com/blog/identity/passive-authentication-cx-future/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passive-authentication-cx-future/</guid><category><![CDATA[customer experience]]></category><category><![CDATA[passive authentication]]></category><category><![CDATA[online shopping]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 17 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d0531f727c32587b6004e928704578de/7f8e9/passive-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Passive authentication lets companies respond to the need for speed and convenience by making authentication seamless and automatic, thus avoiding security risks. Making the shift from active to passive can be a delicate process. But when it&apos;s done right, the benefits are immense. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passive-authentication-cx-future/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Dynamic Authorization & Why Does it Matter?]]></title><description><![CDATA[Dynamic authorization rewards customers with the security they need and effectively improves their experience with your brand. It helps to meet your customer’s needs and, at the same time, gives you much more control over how users access your services.]]></description><link>https://www.loginradius.com/blog/identity/what-is-dynamic-authorization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-dynamic-authorization/</guid><category><![CDATA[dynamic authorization]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 17 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/abb36a95f53cbb5b5c71f2ed3f580d6a/7f8e9/dynamic-authorization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dynamic authorization rewards customers with the security they need and effectively improves their experience with your brand. It helps to meet your customer’s needs and, at the same time, gives you much more control over how users access your services. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-dynamic-authorization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What’s the Difference Between Attack Surface and Attack Vector?]]></title><description><![CDATA[Vulnerability management is essential in security, but more is needed. Attack surface and attack vector are two terms that can help you understand where vulnerabilities are most likely to occur, so you can improve your security posture and reduce risk.]]></description><link>https://www.loginradius.com/blog/identity/attack-surface-vs-attack-vector/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/attack-surface-vs-attack-vector/</guid><category><![CDATA[surface attack]]></category><category><![CDATA[attack vector]]></category><category><![CDATA[login security]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 11 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ab03e5073b8ec82a3f2936e774a0fd07/7f8e9/attack-vector.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Vulnerability management is essential in security, but more is needed. Attack surface and attack vector are two terms that can help you understand where vulnerabilities are most likely to occur, so you can improve your security posture and reduce risk. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/attack-surface-vs-attack-vector/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How Digital Identification Could Be the Key to Inclusive and Economic Growth?]]></title><description><![CDATA[A digital ID is a digitized representation of legal identity, and unlike traditional paper-based IDs, digital identification allows for remote verification via digital channels.  In this article, we’ll look at  how digital identification can help with growth on an economic level.]]></description><link>https://www.loginradius.com/blog/growth/digital-identity-key-to-economic-growth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/digital-identity-key-to-economic-growth/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Alex Williams]]></dc:creator><pubDate>Wed, 09 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ff32459971e03d0712f3a3f179618465/7f8e9/digital-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A digital ID is a digitized representation of legal identity, and unlike traditional paper-based IDs, digital identification allows for remote verification via digital channels.  In this article, we’ll look at  how digital identification can help with growth on an economic level. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/digital-identity-key-to-economic-growth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alex Williams&amp;size=100</authorImage></item><item><title><![CDATA[How Identity-Based Access Ensures Robust Infrastructure Security Amidst the Growing Identity Crisis?]]></title><description><![CDATA[The conventional identity-management tools aren’t potent enough to shield modern threat vectors. There’s a need for a robust identity management solution that combines existing authentication strategies such as two-factor authentication, biometrics, one-time passwords etc. to help secure an organization's infrastructure.]]></description><link>https://www.loginradius.com/blog/identity/secure-data-amidst-identity-crisis-via-identity-based-access/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/secure-data-amidst-identity-crisis-via-identity-based-access/</guid><category><![CDATA[identity management]]></category><category><![CDATA[robust security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 09 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b3a3eb429723859e415a00ce9fa71559/7f8e9/id-crisis.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The conventional identity-management tools aren’t potent enough to shield modern threat vectors. There’s a need for a robust identity management solution that combines existing authentication strategies such as two-factor authentication, biometrics, one-time passwords etc. to help secure an organization&apos;s infrastructure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/secure-data-amidst-identity-crisis-via-identity-based-access/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[2FA Bypass Attacks- Everything You Should Know]]></title><description><![CDATA[2FA bypass attacks are cyberattacks intended for account takeover when hackers have already accessed the credentials of a particular account, and they bypass the second layer of authentication in several ways. This post covers how businesses can shield themselves from the growing number of such threats.]]></description><link>https://www.loginradius.com/blog/identity/what-is-a-2fa-bypass-attack/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-a-2fa-bypass-attack/</guid><category><![CDATA[2fa bypass]]></category><category><![CDATA[cyberattacks]]></category><category><![CDATA[risk based authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 04 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cb2ff019153cd33a0211e65bd6745245/7f8e9/2fa-bypass.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; 2FA bypass attacks are cyberattacks intended for account takeover when hackers have already accessed the credentials of a particular account, and they bypass the second layer of authentication in several ways. This post covers how businesses can shield themselves from the growing number of such threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-a-2fa-bypass-attack/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Decoding the Business Advantage of Digital Privacy for Customers]]></title><description><![CDATA[Investing in privacy isn’t just a matter of mitigating risks pertaining to data breaches; it’s also about navigating business success by building trust and offering value to customers through enhanced security and protections. Let’s understand how businesses can invoke the true potential of digital privacy.]]></description><link>https://www.loginradius.com/blog/growth/what-is-digital-privacy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/what-is-digital-privacy/</guid><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 03 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f5a52ed9d907cfce912b52e7fd023286/7f8e9/digi-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Investing in privacy isn’t just a matter of mitigating risks pertaining to data breaches; it’s also about navigating business success by building trust and offering value to customers through enhanced security and protections. Let’s understand how businesses can invoke the true potential of digital privacy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/what-is-digital-privacy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[IAM vs. Customer IAM: Understanding the Role of CIAM in Accelerating Business Growth]]></title><description><![CDATA[A CIAM can be scaled in real-time depending on the load and number of users accessing the services from a single platform. On the other hand, the traditional IAM can’t deliver results for large-scale deployments. Let’s understand why organizations should switch to customer IAM and how it’s helping businesses stay ahead of the curve.]]></description><link>https://www.loginradius.com/blog/identity/iam-or-ciam-right-call-business-growth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/iam-or-ciam-right-call-business-growth/</guid><category><![CDATA[iam]]></category><category><![CDATA[ciam]]></category><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 03 Nov 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d447f7a011e772f6cd2058ee4204de3a/7f8e9/iam-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A CIAM can be scaled in real-time depending on the load and number of users accessing the services from a single platform. On the other hand, the traditional IAM can’t deliver results for large-scale deployments. Let’s understand why organizations should switch to customer IAM and how it’s helping businesses stay ahead of the curve. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/iam-or-ciam-right-call-business-growth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why MFA Fatigue Attacks May Soon Be Your Worst Nightmare?]]></title><description><![CDATA[MFA fatigue attacks bypass MFA by bombarding a user with multiple login attempts. The account owner accepts the MFA prompt out of desperation or annoyance, leading to an account takeover. Let’s learn how organizations can gear themselves to shield against these attacks.]]></description><link>https://www.loginradius.com/blog/identity/mfa-fatigue-attacks-cybersec-menace/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mfa-fatigue-attacks-cybersec-menace/</guid><category><![CDATA[mfa fatigue]]></category><category><![CDATA[risk-based authentication]]></category><category><![CDATA[authentication process]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 31 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/576625929844df0e40f72ce03e5cc42b/7f8e9/mfa-fatigue.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; MFA fatigue attacks bypass MFA by bombarding a user with multiple login attempts. The account owner accepts the MFA prompt out of desperation or annoyance, leading to an account takeover. Let’s learn how organizations can gear themselves to shield against these attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mfa-fatigue-attacks-cybersec-menace/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Use Identity To Make Your Customers Feel Safe And Empowered?]]></title><description><![CDATA[It goes without saying that excellent UX can improve conversion rates, reduce churn and increase adoption rates. In this blog post, we'll help you figure out how to use digital identity to improve your relationships with customers and make them feel more confident in their interactions with you.]]></description><link>https://www.loginradius.com/blog/growth/identity-management-for-better-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-management-for-better-cx/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 28 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e9660d21b5e60388702cae7b0f8153e8/7f8e9/id-cx.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It goes without saying that excellent UX can improve conversion rates, reduce churn and increase adoption rates. In this blog post, we&apos;ll help you figure out how to use digital identity to improve your relationships with customers and make them feel more confident in their interactions with you. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-management-for-better-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[InfoSec Director, Alok Patidar Answers Your Most Difficult Questions on Cybersecurity]]></title><description><![CDATA[Every organization has unique needs, which means each one has to be protected in its own way. Therefore, we asked Alok Patidar to chip in. As the Director of Information Security at LoginRadius, he’s dedicated his career to helping businesses protect themselves from cyber criminals.]]></description><link>https://www.loginradius.com/blog/identity/alok-patidar-answers-cybersecurity-questions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/alok-patidar-answers-cybersecurity-questions/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[cyberattacks]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 28 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bca0d48cc1ee3eb7e51914bde4812614/7f8e9/cyber.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Every organization has unique needs, which means each one has to be protected in its own way. Therefore, we asked Alok Patidar to chip in. As the Director of Information Security at LoginRadius, he’s dedicated his career to helping businesses protect themselves from cyber criminals. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/alok-patidar-answers-cybersecurity-questions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Understanding MITRE ATT&CK Framework?]]></title><description><![CDATA[Introduced in 2013 by MITRE, the ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a way to describe adversarial behaviors expressed in matrices. The matrices contain different techniques and tactics associated with the usual behavior of attackers before they try to sneak into a network.]]></description><link>https://www.loginradius.com/blog/identity/what-is-mitre-att-ck-framework/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-mitre-att-ck-framework/</guid><category><![CDATA[mitre attack]]></category><category><![CDATA[cyberattack]]></category><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Fri, 28 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/955f0f911a8aa042dcd99d594900cbde/7f8e9/mitre.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Introduced in 2013 by MITRE, the ATT&amp;CK (Adversarial Tactics, Techniques &amp; Common Knowledge) is a way to describe adversarial behaviors expressed in matrices. The matrices contain different techniques and tactics associated with the usual behavior of attackers before they try to sneak into a network. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-mitre-att-ck-framework/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Identity Fabric vs. Zero Trust: Is One a Better Alternative Than The Other?]]></title><description><![CDATA[Identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. This blog will help you understand the difference between the two approaches and their benefits for your organization's security strategy.]]></description><link>https://www.loginradius.com/blog/identity/difference-between-identity-fabrics-zero-trust/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/difference-between-identity-fabrics-zero-trust/</guid><category><![CDATA[identity fabric]]></category><category><![CDATA[zero trust]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 27 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eaf21c5773171f1eb86b208dcf773958/7f8e9/id-fabrics.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. This blog will help you understand the difference between the two approaches and their benefits for your organization&apos;s security strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/difference-between-identity-fabrics-zero-trust/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Role of Customer Identity Management in IoT Security: How It's a Must!]]></title><description><![CDATA[Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies.]]></description><link>https://www.loginradius.com/blog/identity/role-of-ciam-in-iot-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/role-of-ciam-in-iot-security/</guid><category><![CDATA[ciam]]></category><category><![CDATA[iot security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 27 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1982003743377645f3151b6fd66c8de6/7f8e9/iot-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/role-of-ciam-in-iot-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Demystifying Identity Management For Revenue Generation - Going Beyond Compliance]]></title><description><![CDATA[Modern businesses quickly realize that leveraging digital identities as fuel for driving their organizational growth through personalization and robust identity security is becoming the need of the hour. This blog outlines the major depicting how identity management paves the way for organizational growth.]]></description><link>https://www.loginradius.com/blog/growth/identity-management-critical-revenue-generation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-management-critical-revenue-generation/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[ciam]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 17 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/42724fb592caa50caaf01dc8fabbea9e/7f8e9/revenue-generation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Modern businesses quickly realize that leveraging digital identities as fuel for driving their organizational growth through personalization and robust identity security is becoming the need of the hour. This blog outlines the major depicting how identity management paves the way for organizational growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-management-critical-revenue-generation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Securing Centralized Access Without Compromising User Experience]]></title><description><![CDATA[While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. Let’s understand how to enhance customer experience without compromising security.]]></description><link>https://www.loginradius.com/blog/identity/secure-centralized-access-management-without-compromising-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/secure-centralized-access-management-without-compromising-cx/</guid><category><![CDATA[centralized access management]]></category><category><![CDATA[sso]]></category><category><![CDATA[passwordless]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 17 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/15cce30a83ce4e50dd7dddaf0b99f5f8/7f8e9/centralized-access.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. Let’s understand how to enhance customer experience without compromising security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/secure-centralized-access-management-without-compromising-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Authentication Leads The Way in Strategic Customer Acquisitions?]]></title><description><![CDATA[With digital businesses taking over the entire industry, improving customer authentication and email communication with customers has never been more important to maintaining a successful business. This blog explains how authentication can help you increase your customer acquisition.]]></description><link>https://www.loginradius.com/blog/growth/authentication-mainstream-marketers-benefit/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/authentication-mainstream-marketers-benefit/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[digital identity]]></category><category><![CDATA[sso]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Grigori Monaselidze]]></dc:creator><pubDate>Wed, 12 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/be850497a41d23f92b430e8516cd3cb7/7f8e9/auth-benefit.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With digital businesses taking over the entire industry, improving customer authentication and email communication with customers has never been more important to maintaining a successful business. This blog explains how authentication can help you increase your customer acquisition. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/authentication-mainstream-marketers-benefit/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Grigori Monaselidze&amp;size=100</authorImage></item><item><title><![CDATA[User Authentication in the Metaverse: What’s Changing?]]></title><description><![CDATA[The importance of user authentication is paramount to maintaining the security of the metaverse. This blog looks into a number of widely-used authentication models and, in doing so, explores the future of user authentication in the metaverse.]]></description><link>https://www.loginradius.com/blog/identity/changing-user-authentication-in-metaverse/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/changing-user-authentication-in-metaverse/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[biometric authentication]]></category><dc:creator><![CDATA[James Durr]]></dc:creator><pubDate>Wed, 12 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7258ef3f1f73f838e0e68f94a0ce24cc/7f8e9/metaverse.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The importance of user authentication is paramount to maintaining the security of the metaverse. This blog looks into a number of widely-used authentication models and, in doing so, explores the future of user authentication in the metaverse. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/changing-user-authentication-in-metaverse/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=James Durr&amp;size=100</authorImage></item><item><title><![CDATA[7 Tips For Your Enterprise To Have A Great Cybersecurity Awareness Month 2022]]></title><description><![CDATA[This October, we're celebrating Cybersecurity Awareness Month by sharing a few ideas you can do with your team at work. The first step to keeping your company safe is knowing what to look for, and these activities will help you raise awareness about the vulnerabilities out there.]]></description><link>https://www.loginradius.com/blog/growth/7-tips-enjoy-cybersecurity-awareness-month/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/7-tips-enjoy-cybersecurity-awareness-month/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 06 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6dba59d57bbdfb602345c07d580fdbb9/7f8e9/cybermonth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This October, we&apos;re celebrating Cybersecurity Awareness Month by sharing a few ideas you can do with your team at work. The first step to keeping your company safe is knowing what to look for, and these activities will help you raise awareness about the vulnerabilities out there. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/7-tips-enjoy-cybersecurity-awareness-month/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Celebrates National Cybersecurity Month 2022 - Here’s Everything You Should Know]]></title><description><![CDATA[The global cybersecurity threat vector has increased exponentially, and governments across the globe are encouraging people to take accountability to improve their digital privacy. LoginRadius pledges to spread awareness about National Cybersecurity Awareness Month (NCSAM) 2022 through awareness campaigns and help individuals stay safe online.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-to-spread-cybersecurity-awareness/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-to-spread-cybersecurity-awareness/</guid><category><![CDATA[cybersecurity awareness]]></category><category><![CDATA[cybersecurity campaign]]></category><category><![CDATA[customer identity]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 06 Oct 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5427dfaf55f90d2f2fc3ffff19645c80/7f8e9/cybersec-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The global cybersecurity threat vector has increased exponentially, and governments across the globe are encouraging people to take accountability to improve their digital privacy. LoginRadius pledges to spread awareness about National Cybersecurity Awareness Month (NCSAM) 2022 through awareness campaigns and help individuals stay safe online. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-to-spread-cybersecurity-awareness/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[10 Things You Need to Know About Allowing Users to Login With Their Social Media Profiles]]></title><description><![CDATA[Businesses are still relying on old-school login and authentication mechanisms, including organization-level IAM, which is why their business lags behind their competitors. Let’s discuss why businesses need to replace their traditional IAM with new-age CIAM.]]></description><link>https://www.loginradius.com/blog/growth/10-things-know-about-social-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/10-things-know-about-social-login/</guid><dc:creator><![CDATA[Ivana Radevska]]></dc:creator><pubDate>Tue, 27 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a641eb1183c57cf03be35ee530e2da8c/7f8e9/social.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses are still relying on old-school login and authentication mechanisms, including organization-level IAM, which is why their business lags behind their competitors. Let’s discuss why businesses need to replace their traditional IAM with new-age CIAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/10-things-know-about-social-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ivana Radevska&amp;size=100</authorImage></item><item><title><![CDATA[Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?]]></title><description><![CDATA[The rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. This blog highlights the risks associated with the public cloud and how businesses can take timely action to avoid the risks.]]></description><link>https://www.loginradius.com/blog/identity/public-cloud-risks-organization-ready/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/public-cloud-risks-organization-ready/</guid><category><![CDATA[cloud security]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[mfa]]></category><category><![CDATA[zero trust]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 22 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/01f3ef686dbeb05144e43d178f1961fd/7f8e9/public-cloud-risks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. This blog highlights the risks associated with the public cloud and how businesses can take timely action to avoid the risks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/public-cloud-risks-organization-ready/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Reasons Why Publishers Should (Seriously) Consider Using SSO]]></title><description><![CDATA[Single sign-on allows publishers to seamlessly integrate their existing subscription services into one platform so they can collect first party data without having to worry about anything else.]]></description><link>https://www.loginradius.com/blog/growth/publishers-start-using-single-sign-on/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/publishers-start-using-single-sign-on/</guid><category><![CDATA[sso]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 20 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1ec932cd7de93031b0dc98d3fd29649d/7f8e9/sso-publish.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Single sign-on allows publishers to seamlessly integrate their existing subscription services into one platform so they can collect first party data without having to worry about anything else. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/publishers-start-using-single-sign-on/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What Brands Need to Know for Building the Future of Data Compliance?]]></title><description><![CDATA[Identity management is undoubtedly the new leadership model for data protection and business growth. And an identity-first security mechanism is swiftly becoming the need of the hour. This blog highlights the aspects of incorporating identity-first security and how businesses can navigate their digital success.]]></description><link>https://www.loginradius.com/blog/identity/decoding-ethics-identity-first-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/decoding-ethics-identity-first-security/</guid><category><![CDATA[identity management]]></category><category><![CDATA[mfa]]></category><category><![CDATA[ciam]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1e8dcb6733389a427626b861fef4091b/7f8e9/id-first.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity management is undoubtedly the new leadership model for data protection and business growth. And an identity-first security mechanism is swiftly becoming the need of the hour. This blog highlights the aspects of incorporating identity-first security and how businesses can navigate their digital success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/decoding-ethics-identity-first-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Reduce Your Cloud Bills Without Compromising Security]]></title><description><![CDATA[Although cloud computing has offered endless opportunities to businesses embarking on a digital transformation journey, the cost associated with the number of unused resources could be a worrying aspect. This blog covers the aspects of cloud cost optimization with tips to reduce your cloud bills.]]></description><link>https://www.loginradius.com/blog/growth/5-ways-reduce-cloud-cost-optimization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/5-ways-reduce-cloud-cost-optimization/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 15 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cc54aa6190c7f1d8eceb52f130a4a268/7f8e9/cloud-cost.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Although cloud computing has offered endless opportunities to businesses embarking on a digital transformation journey, the cost associated with the number of unused resources could be a worrying aspect. This blog covers the aspects of cloud cost optimization with tips to reduce your cloud bills. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/5-ways-reduce-cloud-cost-optimization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Future of Customer Experience is All About Advanced Identity]]></title><description><![CDATA[Since customer journeys are becoming increasingly complex, brands should focus more on improving their identity management infrastructure. This blog explains the aspects of identity management and how to deliver a rich and secure CX across multiple touchpoints.]]></description><link>https://www.loginradius.com/blog/growth/what-advanced-identity-means-for-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/what-advanced-identity-means-for-cx/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 08 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee14d4ac29e2734ea821995af07f670c/7f8e9/cx-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Since customer journeys are becoming increasingly complex, brands should focus more on improving their identity management infrastructure. This blog explains the aspects of identity management and how to deliver a rich and secure CX across multiple touchpoints. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/what-advanced-identity-means-for-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Okta Identity Credentials on the Radar of Oktapus Phishing Campaign]]></title><description><![CDATA[The phishing campaign, Oktapus, targeted Okta who recently became victim of its phishing attempts. 169 unique domains were identified that fraudsters used to create fake websites.]]></description><link>https://www.loginradius.com/blog/identity/oktapus-phishing-targets-okta-identity-credentials/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/oktapus-phishing-targets-okta-identity-credentials/</guid><category><![CDATA[Phishing]]></category><category><![CDATA[Oktapus]]></category><category><![CDATA[Okta]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 08 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/12c88cd4bfbdc6bab472e47e134584f2/7f8e9/oktapus.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The phishing campaign, Oktapus, targeted Okta who recently became victim of its phishing attempts. 169 unique domains were identified that fraudsters used to create fake websites. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/oktapus-phishing-targets-okta-identity-credentials/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[BC Municipality Digitizes its Citizen Services. LoginRadius Brings Identity to the Table.]]></title><description><![CDATA[A city in BC was looking for a CIAM solution that would secure the identities and streamline the authentication process for its citizens. Here's why they decided to try LoginRadius and the decision worked in their favor.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-secures-identity-management-bc-municpality/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-secures-identity-management-bc-municpality/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Saikiran Babladi]]></dc:creator><pubDate>Tue, 06 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/946f6f2635b211bd180cf82711d9191b/7f8e9/bc-municipal.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A city in BC was looking for a CIAM solution that would secure the identities and streamline the authentication process for its citizens. Here&apos;s why they decided to try LoginRadius and the decision worked in their favor. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-secures-identity-management-bc-municpality/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Saikiran Babladi&amp;size=100</authorImage></item><item><title><![CDATA[The Role of Customer Authentication in Paving the Way for Digital Agility]]></title><description><![CDATA[Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies.]]></description><link>https://www.loginradius.com/blog/identity/role-of-customer-authentication-digital-first-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/role-of-customer-authentication-digital-first-cx/</guid><category><![CDATA[customer authentication]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[ciam]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 06 Sep 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8249776cc9423883c6f29ab1290b746/7f8e9/digital-cx.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/role-of-customer-authentication-digital-first-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Renewing Your Security Vendor Contract? Know When It’s the Time to Switch]]></title><description><![CDATA[Since cybercriminals are constantly exploring new ways to exploit sensitive business and customer information, companies must upgrade their security infrastructure to ensure they remain in a safe zone. Here are some aspects of upgrading your security practices and when businesses must rethink their cybersecurity posture.]]></description><link>https://www.loginradius.com/blog/growth/when-to-switch-your-security-vendor/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/when-to-switch-your-security-vendor/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[mfa]]></category><category><![CDATA[digital identity]]></category><category><![CDATA[cloud security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 31 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/842d0b8bc4d84b16d00291cd81a3aa2e/7f8e9/sec-vendor.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Since cybercriminals are constantly exploring new ways to exploit sensitive business and customer information, companies must upgrade their security infrastructure to ensure they remain in a safe zone. Here are some aspects of upgrading your security practices and when businesses must rethink their cybersecurity posture. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/when-to-switch-your-security-vendor/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What Brands Need to Know for Building the Future of Data Compliance?]]></title><description><![CDATA[Unlike the conventional times when brands used to collect heaps of customer data without their consent, organizations must first build trust in clients before expecting even a bit of detail. Let’s look at some aspects that can help organizations stay ahead of the curve by leveraging digital privacy for compliance management.]]></description><link>https://www.loginradius.com/blog/identity/data-privacy-compliance-future/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-privacy-compliance-future/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[enterprises]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 31 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/457a9f10d8deb38a928ccbdee59d2b83/7f8e9/compliance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unlike the conventional times when brands used to collect heaps of customer data without their consent, organizations must first build trust in clients before expecting even a bit of detail. Let’s look at some aspects that can help organizations stay ahead of the curve by leveraging digital privacy for compliance management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-privacy-compliance-future/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[6 Alternative Authentication Methods For Your Online Customers]]></title><description><![CDATA[Providing alternative authentication methods to your customers will not only make your site more secure but will also give them peace of mind knowing that their information is well-protected. This blog breaks down the popular authentication methods to consider for your customers.]]></description><link>https://www.loginradius.com/blog/identity/6-reliable-authentication-methods-customers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/6-reliable-authentication-methods-customers/</guid><category><![CDATA[authentication]]></category><category><![CDATA[biometric authentication]]></category><category><![CDATA[digital trust]]></category><dc:creator><![CDATA[Andre Oentoro]]></dc:creator><pubDate>Fri, 26 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/796438aef7b2e78b9065c4d2c63272a8/7f8e9/reliable-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Providing alternative authentication methods to your customers will not only make your site more secure but will also give them peace of mind knowing that their information is well-protected. This blog breaks down the popular authentication methods to consider for your customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/6-reliable-authentication-methods-customers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andre Oentoro&amp;size=100</authorImage></item><item><title><![CDATA[Implementing Zero Trust? Make Sure You're Doing It Correctly]]></title><description><![CDATA[Though zero trust architecture may be potent for reinforcing overall security, chances of sneaking and security breaches aren’t always zero. If not implemented correctly, zero trust could lead to various security and user experience issues and hampers overall business growth.]]></description><link>https://www.loginradius.com/blog/identity/zero-trust-bulletproof-security-policy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/zero-trust-bulletproof-security-policy/</guid><category><![CDATA[zero trust]]></category><category><![CDATA[MFA]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 23 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fbfd6671d62e3efbc08355383cb57788/7f8e9/zt-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Though zero trust architecture may be potent for reinforcing overall security, chances of sneaking and security breaches aren’t always zero. If not implemented correctly, zero trust could lead to various security and user experience issues and hampers overall business growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/zero-trust-bulletproof-security-policy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why is Data Transparency Critical To Building Connected Consumer Journeys?]]></title><description><![CDATA[Data is your most valuable resource when it comes to enhancing customer transparency. But how exactly can your company sort and apply all the data you collect from different customer touchpoints? This blog shares some actionable ideas.]]></description><link>https://www.loginradius.com/blog/growth/build-customer-journeys-data-transparency/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/build-customer-journeys-data-transparency/</guid><category><![CDATA[progressive profiling]]></category><category><![CDATA[cx]]></category><category><![CDATA[data transparency]]></category><dc:creator><![CDATA[Lucy Manole]]></dc:creator><pubDate>Thu, 18 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bbd6bf8faccdc16d3ce6f314724417f5/7f8e9/customer-journey.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Data is your most valuable resource when it comes to enhancing customer transparency. But how exactly can your company sort and apply all the data you collect from different customer touchpoints? This blog shares some actionable ideas. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/build-customer-journeys-data-transparency/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucy Manole&amp;size=100</authorImage></item><item><title><![CDATA[What is Federated SSO (Single Sign-On)?]]></title><description><![CDATA[With fed SSO, businesses can bridge the authentication gap between multiple platforms and enable users to access services without needing a separate login at the partner platform. This blog explains fed SSO and how businesses should leverage it.]]></description><link>https://www.loginradius.com/blog/identity/what-is-federated-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-federated-sso/</guid><category><![CDATA[single sign-on]]></category><category><![CDATA[federated sso]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 17 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c435e2de82045e365020abed787b0db8/7f8e9/federated-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With fed SSO, businesses can bridge the authentication gap between multiple platforms and enable users to access services without needing a separate login at the partner platform. This blog explains fed SSO and how businesses should leverage it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-federated-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[MFA Prompt Bombing: Is it a New Threat Vector to Worry About?]]></title><description><![CDATA[The MFA prompt attacks typically leverage MFA fatigue, where users get annoyed and unknowingly or unwillingly accept authentication attempts initiated by cyber attackers. This post uncovers the aspects associated with MFA prompt bombing attacks and how businesses can reinforce their overall security infrastructure.]]></description><link>https://www.loginradius.com/blog/identity/mfa-prompt-bombing-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mfa-prompt-bombing-businesses/</guid><category><![CDATA[MFA]]></category><category><![CDATA[risk-based authentication]]></category><category><![CDATA[user access]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Mon, 08 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5c67a8bfe15c1d454752a0bc5a82871d/7f8e9/mfa-prompt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The MFA prompt attacks typically leverage MFA fatigue, where users get annoyed and unknowingly or unwillingly accept authentication attempts initiated by cyber attackers. This post uncovers the aspects associated with MFA prompt bombing attacks and how businesses can reinforce their overall security infrastructure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mfa-prompt-bombing-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Privacy-Centric Enhancements: CEO Rakesh Soni Shares His Thoughts on Shifting Data Strategies]]></title><description><![CDATA[With more and more businesses taking place online and grappling with the new privacy and data security complexities, there’s an immediate need to reinvent data management strategies. Let’s understand the role of privacy and data management and how businesses can take the competitive edge.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-ceo-shifting-data-strategies/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-ceo-shifting-data-strategies/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[cloud computing]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 02 Aug 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3ef2123b346c2afc6bf0471b0ccf750d/7f8e9/privacy-centric.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With more and more businesses taking place online and grappling with the new privacy and data security complexities, there’s an immediate need to reinvent data management strategies. Let’s understand the role of privacy and data management and how businesses can take the competitive edge. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-ceo-shifting-data-strategies/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Authentication Has Gone Mainstream: Are Marketers Ready to Take the Responsibility?]]></title><description><![CDATA[Authentication is the most important security feature any application can have because it's the gateway through which users interact with your data. This blog explains how marketers can leverage user authentication.]]></description><link>https://www.loginradius.com/blog/growth/authentication-critical-customer-acquistion-tool/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/authentication-critical-customer-acquistion-tool/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 29 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3c9e3a33507ec0c1b7419adf07d2664c/7f8e9/auth-marketers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication is the most important security feature any application can have because it&apos;s the gateway through which users interact with your data. This blog explains how marketers can leverage user authentication. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/authentication-critical-customer-acquistion-tool/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[The Role of Identity Management in Securing Your Citizen’s Data]]></title><description><![CDATA[ Identity management has been a game-changer for enterprises for decades as it helps businesses succeed by ensuring the highest level of security and great user experience.  Let’s understand the aspects of leveraging identity management through a reliable customer identity and access management (CIAM) platform for fixing security and usability issues in the public sector.]]></description><link>https://www.loginradius.com/blog/identity/fix-identity-to-fix-citizens-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/fix-identity-to-fix-citizens-security/</guid><category><![CDATA[digital identity]]></category><category><![CDATA[smart cities]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Fri, 29 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f464c628646d30ca49f64a1dc06fa96c/7f8e9/citizen-sec.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Identity management has been a game-changer for enterprises for decades as it helps businesses succeed by ensuring the highest level of security and great user experience.  Let’s understand the aspects of leveraging identity management through a reliable customer identity and access management (CIAM) platform for fixing security and usability issues in the public sector. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/fix-identity-to-fix-citizens-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Implement JWT Authentication for CRUD APIs in Deno]]></title><description><![CDATA[In this hands-on tutorial, you'll learn from scratch how to implement JWT authentication for CRUD APIs in Deno.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/how-to-implement-jwt-authentication-in-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/how-to-implement-jwt-authentication-in-deno/</guid><category><![CDATA[JWT]]></category><category><![CDATA[Deno]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Ekekenta Odionyenfe Clinton]]></dc:creator><pubDate>Thu, 28 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ecb7a333dd6ee8ea03a2f5cc6c9633c2/58556/jwt-authentication-with-deno.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this hands-on tutorial, you&apos;ll learn from scratch how to implement JWT authentication for CRUD APIs in Deno. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/how-to-implement-jwt-authentication-in-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>15</timeToReadBlog><authorImage>https://github.com/icode247.png?size=100v=40</authorImage></item><item><title><![CDATA[Why is Data Privacy an Immediate Enterprise Priority?]]></title><description><![CDATA[In the past ten years, the rise of privacy-conscious consumers and emerging data regulations have compelled enterprises to prioritize their data management programs. Read more to learn how data privacy has become an enterprise priority.]]></description><link>https://www.loginradius.com/blog/identity/data-privacy-immediate-enterprise-priority/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-privacy-immediate-enterprise-priority/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[enterprises]]></category><category><![CDATA[regulations]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8f2c9aad77b26d143bbb81a345eaf678/7f8e9/dg-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the past ten years, the rise of privacy-conscious consumers and emerging data regulations have compelled enterprises to prioritize their data management programs. Read more to learn how data privacy has become an enterprise priority. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-privacy-immediate-enterprise-priority/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Win the Era Of Customer-Centric Marketing?]]></title><description><![CDATA[A customer-centric approach to marketing means that businesses are no longer focused on the products themselves, but instead prefer to understand customer demands. This blog explains how retailers can make their customers happy by advocating customer-centricity.]]></description><link>https://www.loginradius.com/blog/growth/lead-era-customer-centric-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/lead-era-customer-centric-marketing/</guid><category><![CDATA[customer onboarding]]></category><category><![CDATA[cx]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 26 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b7ba07468048716e0fb38631f33f29ab/7f8e9/customer-centric.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A customer-centric approach to marketing means that businesses are no longer focused on the products themselves, but instead prefer to understand customer demands. This blog explains how retailers can make their customers happy by advocating customer-centricity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/lead-era-customer-centric-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What is Out-of-Band Authentication?]]></title><description><![CDATA[Securing customer information is becoming more challenging, especially in a remote-first working environment with a poor line of defense. OOB authentication is used as a part of multi-factor authentication (MFA) or 2FA that verifies the identity of a user from two different communications channels, ensuring robust security.]]></description><link>https://www.loginradius.com/blog/identity/what-is-out-of-band-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-out-of-band-authentication/</guid><category><![CDATA[authentication]]></category><category><![CDATA[MFA]]></category><category><![CDATA[customer data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 22 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0617b2f211764c80b4cb0d1b497aeea0/7f8e9/oob-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Securing customer information is becoming more challenging, especially in a remote-first working environment with a poor line of defense. OOB authentication is used as a part of multi-factor authentication (MFA) or 2FA that verifies the identity of a user from two different communications channels, ensuring robust security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-out-of-band-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Can Enterprises Use SSO to Boost Data Collection?]]></title><description><![CDATA[SSO is a great way to collect data while providing a better user experience and increasing security. This blog will help you get the most out of SSO for data collection, ensuring that your data is collected effectively and efficiently.]]></description><link>https://www.loginradius.com/blog/identity/sso-leverage-for-data-collection/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sso-leverage-for-data-collection/</guid><category><![CDATA[sso]]></category><category><![CDATA[mfa]]></category><category><![CDATA[data collection]]></category><category><![CDATA[ux]]></category><dc:creator><![CDATA[Hanson Cheng]]></dc:creator><pubDate>Tue, 19 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/07b75c0453dbf78a562cd499371f9d7e/7f8e9/sso-leverage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SSO is a great way to collect data while providing a better user experience and increasing security. This blog will help you get the most out of SSO for data collection, ensuring that your data is collected effectively and efficiently. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sso-leverage-for-data-collection/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hanson Cheng&amp;size=100</authorImage></item><item><title><![CDATA[How Progressive Profiling Reduces Registration Fatigue and Improves Lead Quality?]]></title><description><![CDATA[Progressive profiling ensures valuable information about a user is gradually collected over time so that it doesn’t create friction while a user lands on a platform, which enhances the overall quality and number of leads. This blog explains the role of progressive profiling in improving overall lead quality and quantity.]]></description><link>https://www.loginradius.com/blog/growth/progressive-profiling-lead-generation-tool/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/progressive-profiling-lead-generation-tool/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 15 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8472641ec2366e1664f4ee64e2174d5b/7f8e9/lead-gen.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Progressive profiling ensures valuable information about a user is gradually collected over time so that it doesn’t create friction while a user lands on a platform, which enhances the overall quality and number of leads. This blog explains the role of progressive profiling in improving overall lead quality and quantity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/progressive-profiling-lead-generation-tool/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Why Your Business Needs A Simple Passwordless Experience (Minus the User Friction)]]></title><description><![CDATA[Whether it’s a little friction in login authentication or user fatigue in filling massive registration forms, everything counts when it comes to a bad user experience. Let’s uncover the importance of going passwordless for enterprises.]]></description><link>https://www.loginradius.com/blog/identity/passwordless-going-navigate-business-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passwordless-going-navigate-business-success/</guid><category><![CDATA[passwordless]]></category><category><![CDATA[login security]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 13 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fad25590772e67ca0b89e1d5c8d45a32/7f8e9/passwordless-business.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether it’s a little friction in login authentication or user fatigue in filling massive registration forms, everything counts when it comes to a bad user experience. Let’s uncover the importance of going passwordless for enterprises. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passwordless-going-navigate-business-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Will Apple’s ‘Lockdown Mode’ Reduce State-Sponsored Attacks?]]></title><description><![CDATA[The ‘lockdown mode’ is considered a giant leap as a part of their information security for protecting operating systems of iPhone, iPad, and Mac against various threats, including spyware. Let’s understand what a state-sponsored attack is and how this new feature in Apple devices would work to protect critical customer information.]]></description><link>https://www.loginradius.com/blog/identity/apple-lockdown-mode-robust-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/apple-lockdown-mode-robust-security/</guid><category><![CDATA[cyberattacks]]></category><category><![CDATA[apple]]></category><category><![CDATA[zero trust]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 07 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b824f8e123db1562816b3d76213a497d/7f8e9/apple-inc.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The ‘lockdown mode’ is considered a giant leap as a part of their information security for protecting operating systems of iPhone, iPad, and Mac against various threats, including spyware. Let’s understand what a state-sponsored attack is and how this new feature in Apple devices would work to protect critical customer information. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/apple-lockdown-mode-robust-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Planning to Reduce Your CPA By 50%? You Need ID Management]]></title><description><![CDATA[An essential marketing requirement is to know your customers first and then learn about their preferences. With a reliable CIAM system, marketers need not worry about collecting valuable customer insights; CIAM does it all without burning a pocket!  Let’s understand how.]]></description><link>https://www.loginradius.com/blog/growth/identity-management-reduce-cpa-marketers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/identity-management-reduce-cpa-marketers/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 06 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ef54f3ac7585f3bea5fc69c04b6344c3/7f8e9/cpa-market.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; An essential marketing requirement is to know your customers first and then learn about their preferences. With a reliable CIAM system, marketers need not worry about collecting valuable customer insights; CIAM does it all without burning a pocket!  Let’s understand how. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/identity-management-reduce-cpa-marketers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Authentication, Identity Verification, and Identification: What's the Difference]]></title><description><![CDATA[People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between the three and the importance of each from an information security perspective.]]></description><link>https://www.loginradius.com/blog/identity/authentication-identity-verification-identification/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-identity-verification-identification/</guid><category><![CDATA[authentication]]></category><category><![CDATA[identity verification]]></category><category><![CDATA[identity security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 06 Jul 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8b797a7f823e9737de325dbddd056db1/7f8e9/auth-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between the three and the importance of each from an information security perspective. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-identity-verification-identification/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Multi-Factor Authentication (MFA) with Redis Cache and OTP]]></title><description><![CDATA[Want to implement Multi-Factor Authentication (MFA)? Follow this tutorial to implement MFA using Redis Cache and OTP in your applications.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/multi-factor-authentication-using-redis-cache-and-otp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/multi-factor-authentication-using-redis-cache-and-otp/</guid><category><![CDATA[Node.js]]></category><category><![CDATA[Redis]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Fredrick Emmanuel]]></dc:creator><pubDate>Thu, 30 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3daec096b51ef3e91f85364c0c87892b/58556/mfa-with-redis-cache-and-otp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Want to implement Multi-Factor Authentication (MFA)? Follow this tutorial to implement MFA using Redis Cache and OTP in your applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/multi-factor-authentication-using-redis-cache-and-otp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>14</timeToReadBlog><authorImage>https://github.com/divofred.png?size=100v=40</authorImage></item><item><title><![CDATA[Earning Digital Trust in 2022: Where Should Businesses Invest?]]></title><description><![CDATA[Whether securing access control or rethinking privacy policies, businesses skipping a small step in protecting customer information could lead to losses worth millions of dollars and reputational damages since bad actors are already exploring new ways to exploit customer information. Here’s an insightful post that uncovers the aspects of digital trust and where businesses need to invest to earn digital trust in 2022 and beyond.]]></description><link>https://www.loginradius.com/blog/growth/digital-trust-business-invest-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/digital-trust-business-invest-2022/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[customer trust]]></category><category><![CDATA[enterprises]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 28 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f2cc0d345fa71db7fb1ce3cce76011ce/7f8e9/digital-trust.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether securing access control or rethinking privacy policies, businesses skipping a small step in protecting customer information could lead to losses worth millions of dollars and reputational damages since bad actors are already exploring new ways to exploit customer information. Here’s an insightful post that uncovers the aspects of digital trust and where businesses need to invest to earn digital trust in 2022 and beyond. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/digital-trust-business-invest-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[IoT Botnet Attacks: Are They the Next Big Threat to Enterprises?]]></title><description><![CDATA[Enterprises developing IoT devices, smart applications, or other systems in the IoT landscape shouldn’t ignore the risks associated with botnet attacks. Read this insightful post to understand what an IoT botnet attack means and how IoT developers and vendors can mitigate the risk.]]></description><link>https://www.loginradius.com/blog/identity/iot-botnet-attacks-enterprises/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/iot-botnet-attacks-enterprises/</guid><category><![CDATA[iot]]></category><category><![CDATA[botnet]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ux]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 28 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f12459f4b9ee3eb6b4584acd8e66a027/7f8e9/iot-botnet.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Enterprises developing IoT devices, smart applications, or other systems in the IoT landscape shouldn’t ignore the risks associated with botnet attacks. Read this insightful post to understand what an IoT botnet attack means and how IoT developers and vendors can mitigate the risk. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/iot-botnet-attacks-enterprises/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[Introduction to SolidJS]]></title><description><![CDATA[In this tutorial, you’ll learn what SolidJS is, how it works, and its fundamentals such as reactivity, architecture, events, effects, etc. Then you’ll use this knowledge to build a simple todo app. Finally, you’ll understand how SolidJS compares with React and how it’s better and worse.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/introduction-to-solidjs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/introduction-to-solidjs/</guid><category><![CDATA[SolidJS]]></category><category><![CDATA[React]]></category><category><![CDATA[Frontend]]></category><dc:creator><![CDATA[Siddhant Varma]]></dc:creator><pubDate>Tue, 28 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/98c70b8f15d4e24e9751c950a5a4f1cc/58556/introduction-to-solidjs.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, you’ll learn what SolidJS is, how it works, and its fundamentals such as reactivity, architecture, events, effects, etc. Then you’ll use this knowledge to build a simple todo app. Finally, you’ll understand how SolidJS compares with React and how it’s better and worse. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/introduction-to-solidjs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>16</timeToReadBlog><authorImage>https://github.com/FuzzySid.png?size=100v=40</authorImage></item><item><title><![CDATA[Skiperformance - a LoginRadius Customer Success Story]]></title><description><![CDATA[A greatly transformed user experience that welcomed over 600,000 new customers for Skiperformance.]]></description><link>https://www.loginradius.com/blog/identity/skiperformance-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/skiperformance-loginradius-customer-success-story/</guid><category><![CDATA[ecommerce]]></category><category><![CDATA[customer success]]></category><dc:creator><![CDATA[Ritika Kapahi]]></dc:creator><pubDate>Thu, 23 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0d1efa2a19bd76a538e29d0f2b44d578/58556/Skiperformance-featured-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A greatly transformed user experience that welcomed over 600,000 new customers for Skiperformance. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/skiperformance-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ritika Kapahi&amp;size=100</authorImage></item><item><title><![CDATA[Reaping the Benefits of the Cloud Beyond Marketing]]></title><description><![CDATA[Cloud computing offers more than just helping marketers plan and execute effective marketing campaigns. Let’s look at some advantages of adopting cloud computing and why enterprises should consider relying on cloud computing to thrive overall business success.]]></description><link>https://www.loginradius.com/blog/growth/business-advantages-cloud-computing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/business-advantages-cloud-computing/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 21 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/53f7ca73ada7bb59a5b8ffbdb2f64e2f/7f8e9/cloud-marketg.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cloud computing offers more than just helping marketers plan and execute effective marketing campaigns. Let’s look at some advantages of adopting cloud computing and why enterprises should consider relying on cloud computing to thrive overall business success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/business-advantages-cloud-computing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Cross-Device Authentication and Tracking: The Opportunities and Underlying Privacy Risks]]></title><description><![CDATA[Cross-device tracking enables quick tracking of users across multiple devices. However, leveraging such technologies across multiple platforms has underlying risks. This post uncovers the aspects of cross-device authentication and what business owners need to understand.]]></description><link>https://www.loginradius.com/blog/identity/cross-device-authentication-enterprises/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cross-device-authentication-enterprises/</guid><category><![CDATA[cross device]]></category><category><![CDATA[authentication]]></category><category><![CDATA[digital transformation]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 21 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/656582ec270bf33366f788b4a4665bc4/7f8e9/cross-device.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cross-device tracking enables quick tracking of users across multiple devices. However, leveraging such technologies across multiple platforms has underlying risks. This post uncovers the aspects of cross-device authentication and what business owners need to understand. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cross-device-authentication-enterprises/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Identity Modernization Will Thrive Business Success in 2022 and Beyond]]></title><description><![CDATA[When done correctly, password resets can be easy and relatively painless for both the customer and the enterprise. By following tips mentioned in this blog, enterprises can ensure that the customers have a positive experience when resetting their passwords.]]></description><link>https://www.loginradius.com/blog/identity/identity-modernization-business-success-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-modernization-business-success-2022/</guid><category><![CDATA[identity modernization]]></category><category><![CDATA[ciam]]></category><category><![CDATA[zero trust]]></category><category><![CDATA[ciam]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 17 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5422d61da7cbd2076fa0a4e5b405394d/7f8e9/id-modern.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When done correctly, password resets can be easy and relatively painless for both the customer and the enterprise. By following tips mentioned in this blog, enterprises can ensure that the customers have a positive experience when resetting their passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-modernization-business-success-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Identity Management Can Help You Avoid Targeting The Wrong Customers?]]></title><description><![CDATA[Since businesses serve customers across various devices and channels, yielding multiple views of the same customer becomes tricky. And the result is a messed experience that hampers customer experience and expectations, leading to mistaken identity. Let’s dig deeper into the aspects of leveraging a CIAM solution that helps overcome the challenges of mistaken identity.]]></description><link>https://www.loginradius.com/blog/growth/how-identity-management-help-mistaken-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-identity-management-help-mistaken-identity/</guid><category><![CDATA[identity security]]></category><category><![CDATA[ciam]]></category><category><![CDATA[customer experience]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 14 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/58722ecc89d4bec5d07546563f87ccb6/7f8e9/mistaken-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Since businesses serve customers across various devices and channels, yielding multiple views of the same customer becomes tricky. And the result is a messed experience that hampers customer experience and expectations, leading to mistaken identity. Let’s dig deeper into the aspects of leveraging a CIAM solution that helps overcome the challenges of mistaken identity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-identity-management-help-mistaken-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[The Pros & Cons of Reusable Digital Identity: What You Need To Know]]></title><description><![CDATA[Keeping track of multiple digital identities is cumbersome and may lead users to adopt risky practices (like  duplicating passwords) just so they can remember them. A better way to deal with it is reusable digital identities. And as the technology matures, the upsides will only increase.]]></description><link>https://www.loginradius.com/blog/identity/pros-cons-reusable-digital-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pros-cons-reusable-digital-identity/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Alex Williams]]></dc:creator><pubDate>Tue, 14 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e4077cf27818511dc758bc2e7cc6c24f/7f8e9/reusable-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Keeping track of multiple digital identities is cumbersome and may lead users to adopt risky practices (like  duplicating passwords) just so they can remember them. A better way to deal with it is reusable digital identities. And as the technology matures, the upsides will only increase. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pros-cons-reusable-digital-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alex Williams&amp;size=100</authorImage></item><item><title><![CDATA[The Peerless Role of Cookieless Identity Solution for Marketers]]></title><description><![CDATA[With cookieless authentication, enterprises can leverage the true potential of a CIAM solution in marketing their products and services without compromising user experience. This post explains why businesses quickly need to put their best foot forward in adopting a cookieless authentication platform.]]></description><link>https://www.loginradius.com/blog/growth/role-cookieless-authentication-marketers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/role-cookieless-authentication-marketers/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 09 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1f1710b4ebe11fc1d1823d963d8372b5/7f8e9/cookieless-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With cookieless authentication, enterprises can leverage the true potential of a CIAM solution in marketing their products and services without compromising user experience. This post explains why businesses quickly need to put their best foot forward in adopting a cookieless authentication platform. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/role-cookieless-authentication-marketers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is Cloud Security and How it Works?]]></title><description><![CDATA[Cloud security is a growing concern for businesses that rely on cloud-based services. The use of these services has become widespread over the past decade or so, but many companies still don't fully understand how to protect themselves from cyber threats. Read this blog to know what exactly is cloud security and how it works.]]></description><link>https://www.loginradius.com/blog/identity/what-is-cloud-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-cloud-security/</guid><category><![CDATA[cloud security]]></category><category><![CDATA[cloud identity management]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 09 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/26bd2bf9361b2bb7a8a014b218550dc4/7f8e9/cloud-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cloud security is a growing concern for businesses that rely on cloud-based services. The use of these services has become widespread over the past decade or so, but many companies still don&apos;t fully understand how to protect themselves from cyber threats. Read this blog to know what exactly is cloud security and how it works. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-cloud-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Why We Re-engineered LoginRadius APIs with Go?]]></title><description><![CDATA[At Loginradius, we strive to leverage technology and ingenuity to push the boundaries of what our Identity Platform can deliver. In this engineering article, learn how we improved the performance of our APIs with Go.]]></description><link>https://www.loginradius.com/blog/engineering/why-we-rebuilt-loginradius-dot-net-core-apis-with-go/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/why-we-rebuilt-loginradius-dot-net-core-apis-with-go/</guid><category><![CDATA[Go]]></category><category><![CDATA[API]]></category><category><![CDATA[.NET]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Mon, 06 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/da26686e342d94b3007681cd0379367c/58556/high-performance-identity-apis.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; At Loginradius, we strive to leverage technology and ingenuity to push the boundaries of what our Identity Platform can deliver. In this engineering article, learn how we improved the performance of our APIs with Go. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/why-we-rebuilt-loginradius-dot-net-core-apis-with-go/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Age of No-Code Technologies: Identification and Authentication]]></title><description><![CDATA[No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take a look at how it has improved the identification and authentication process for businesses.]]></description><link>https://www.loginradius.com/blog/identity/authenticating-in-the-age-of-no-code-technology/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authenticating-in-the-age-of-no-code-technology/</guid><category><![CDATA[no code]]></category><category><![CDATA[identification]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Tim Ferguson]]></dc:creator><pubDate>Fri, 03 Jun 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5ee1ceb35d7e8fd515c3fc2e0caeb39b/7f8e9/no-code.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take a look at how it has improved the identification and authentication process for businesses. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authenticating-in-the-age-of-no-code-technology/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Tim Ferguson&amp;size=100</authorImage></item><item><title><![CDATA[Why B2B Companies Should Implement Identity Management]]></title><description><![CDATA[B2B companies need to manage identity differently to meet customer needs and deliver value efficiently while ensuring secure and seamless access. Read more to learn how your company can implement B2B identity management.]]></description><link>https://www.loginradius.com/blog/engineering/identity-management-for-b2b-companies/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/identity-management-for-b2b-companies/</guid><category><![CDATA[Identity]]></category><category><![CDATA[Access Management]]></category><category><![CDATA[B2B]]></category><dc:creator><![CDATA[Ravi Teja Ganta]]></dc:creator><pubDate>Tue, 31 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e25d9ab8ae7c1c0010fb32fd588f892a/58556/b2b-identity-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; B2B companies need to manage identity differently to meet customer needs and deliver value efficiently while ensuring secure and seamless access. Read more to learn how your company can implement B2B identity management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/identity-management-for-b2b-companies/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/ravitejag.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 10 Cyber Threats in 2022]]></title><description><![CDATA[Cybercriminals are using an increasing number of attacks to exploit web apps and steal valuable data. This article teaches about the ten most common types of cyber threats.]]></description><link>https://www.loginradius.com/blog/engineering/top-cyber-threats-in-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/top-cyber-threats-in-2022/</guid><category><![CDATA[Cyber Threats]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Tue, 31 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee3ab87a1a76ecb64198016552132df2/58556/top-10-cyber-threats-in-2022.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybercriminals are using an increasing number of attacks to exploit web apps and steal valuable data. This article teaches about the ten most common types of cyber threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/top-cyber-threats-in-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[How IT and Marketing Go Hand-in-Hand in the Business of Customer Identity Management?]]></title><description><![CDATA[Promoting your brand and delivering out-of-the-box services reinforced with robust security is paramount for business success. However, delivering rich experiences remains the most underrated catalyst that can pave the path for exponential growth!]]></description><link>https://www.loginradius.com/blog/growth/role-it-marketing-customer-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/role-it-marketing-customer-identity-management/</guid><category><![CDATA[marketing]]></category><category><![CDATA[ciam]]></category><category><![CDATA[IT]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 31 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f04fea09ea4f1cd333874ad61695a7fd/7f8e9/it-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Promoting your brand and delivering out-of-the-box services reinforced with robust security is paramount for business success. However, delivering rich experiences remains the most underrated catalyst that can pave the path for exponential growth! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/role-it-marketing-customer-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[SSO vs. Social Login: What’s the Difference? [Infographic]]]></title><description><![CDATA[The era of unified login has offered numerous ways through which users can authenticate themselves securely and seamlessly. Let’s understand the fundamental differences between SSO and Social Login that helps you choose the right authentication solution for your business requirements.]]></description><link>https://www.loginradius.com/blog/identity/difference-sso-social-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/difference-sso-social-login/</guid><category><![CDATA[sso]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 31 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/708c9dc499afb8af8f7cd87824be94e7/7f8e9/sso-social-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The era of unified login has offered numerous ways through which users can authenticate themselves securely and seamlessly. Let’s understand the fundamental differences between SSO and Social Login that helps you choose the right authentication solution for your business requirements. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/difference-sso-social-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Evolution of Authentication: From Passwords to Passwordless & More]]></title><description><![CDATA[Over the past years, the evolution of authentication portrays the risks associated with unauthorized access and the growing number of cybersecurity threats that leads to compromised user information and sensitive business data. Here’s an insightful read depicting authentication aspects and how it has evolved over a decade.]]></description><link>https://www.loginradius.com/blog/growth/authentication-evolution-to-passwordless/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/authentication-evolution-to-passwordless/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[new age authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 27 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/090fc469b66357dca6cc7125594c7b06/7f8e9/evolution-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Over the past years, the evolution of authentication portrays the risks associated with unauthorized access and the growing number of cybersecurity threats that leads to compromised user information and sensitive business data. Here’s an insightful read depicting authentication aspects and how it has evolved over a decade. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/authentication-evolution-to-passwordless/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Planning a Digital Makeover For Your Business? LoginRadius CIAM Can Help!]]></title><description><![CDATA[Incorporating a CIAM solution could be the best way to overcome security and challenges related to customer experience. Learn how LoginRadius can help businesses navigate their digital transformation journey and scale growth.]]></description><link>https://www.loginradius.com/blog/identity/transform-business-with-loginradius-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/transform-business-with-loginradius-ciam/</guid><category><![CDATA[ciam]]></category><category><![CDATA[user experience]]></category><category><![CDATA[sso]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 27 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4884380a37a7ca4207146385c52bc68d/7f8e9/business-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Incorporating a CIAM solution could be the best way to overcome security and challenges related to customer experience. Learn how LoginRadius can help businesses navigate their digital transformation journey and scale growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/transform-business-with-loginradius-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Cloud Computing?]]></title><description><![CDATA[The concept of cloud computing has offered endless possibilities to businesses since enterprises can avoid several upfront costs and can quickly rent access to any application or storage from a cloud provider. This post uncovers the role of cloud computing in shaping the future of a digitally-advanced modern world.]]></description><link>https://www.loginradius.com/blog/identity/what-is-cloud-computing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-cloud-computing/</guid><category><![CDATA[cloud computing]]></category><category><![CDATA[cloud security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 24 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8f19cb596518c4f7c93163028995bd77/7f8e9/cloud-computing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The concept of cloud computing has offered endless possibilities to businesses since enterprises can avoid several upfront costs and can quickly rent access to any application or storage from a cloud provider. This post uncovers the role of cloud computing in shaping the future of a digitally-advanced modern world. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-cloud-computing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[How Can Enterprises Deliver Better Customer Experiences with Unified Identity?]]></title><description><![CDATA[Unified identity can do wonders for a brand if a business leverages its true potential. Let’s uncover some aspects of unified identity and how brands leverage the same to engage users and foster business growth.]]></description><link>https://www.loginradius.com/blog/growth/unified-identity-ensures-great-customer-interactions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/unified-identity-ensures-great-customer-interactions/</guid><category><![CDATA[customer experience]]></category><category><![CDATA[sso]]></category><category><![CDATA[identity management]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Wed, 18 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1a63fb9c04a66fb5b409cbee55fa07f8/7f8e9/customer-interactions.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unified identity can do wonders for a brand if a business leverages its true potential. Let’s uncover some aspects of unified identity and how brands leverage the same to engage users and foster business growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/unified-identity-ensures-great-customer-interactions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Authentication vs Login - What’s the Difference?]]></title><description><![CDATA[Most cybercriminals attack users and exploit businesses by targeting weak authentication and login mechanisms. Businesses first need to understand the fundamental difference between authentication and login. Once they know the aspects of authentication vs. login, the next step is to ensure a stringent layer of security for their users.]]></description><link>https://www.loginradius.com/blog/identity/difference-between-authentication-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/difference-between-authentication-login/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[login]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 18 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d96e25b1dc62e25fc6f18fd6bf6753e7/7f8e9/auth-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Most cybercriminals attack users and exploit businesses by targeting weak authentication and login mechanisms. Businesses first need to understand the fundamental difference between authentication and login. Once they know the aspects of authentication vs. login, the next step is to ensure a stringent layer of security for their users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/difference-between-authentication-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How a Simple Password Reset Can Ruin Your Customer's Experience]]></title><description><![CDATA[When done correctly, password resets can be easy and relatively painless for both the customer and the enterprise. By following tips mentioned in this blog, enterprises can ensure that the customers have a positive experience when resetting their passwords.]]></description><link>https://www.loginradius.com/blog/identity/is-password-reset-ruining-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/is-password-reset-ruining-cx/</guid><category><![CDATA[data security]]></category><category><![CDATA[consumer-experience]]></category><category><![CDATA[authentication]]></category><category><![CDATA[identity-verification]]></category><dc:creator><![CDATA[Chris Starkhagen]]></dc:creator><pubDate>Tue, 17 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8a597a6c09ae905f6454ab9a4c63af38/7f8e9/paswd-reset.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When done correctly, password resets can be easy and relatively painless for both the customer and the enterprise. By following tips mentioned in this blog, enterprises can ensure that the customers have a positive experience when resetting their passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/is-password-reset-ruining-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Starkhagen&amp;size=100</authorImage></item><item><title><![CDATA[Build a Modern Login/Signup Form with Tailwind CSS and React]]></title><description><![CDATA[In this article, you'll learn how to instantly build great-looking authentication forms for Login and Signup using Tailwind CSS in React. You'll also understand how to make these forms functional using the third-party Authentication service LoginRadius.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/modern-login-signup-form-tailwindcss-react/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/modern-login-signup-form-tailwindcss-react/</guid><category><![CDATA[Tailwind CSS]]></category><category><![CDATA[React]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Siddhant Varma]]></dc:creator><pubDate>Tue, 17 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0728a88362b98d67ce941ed2c33ccd43/58556/modern-login-and-signup-form-banner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, you&apos;ll learn how to instantly build great-looking authentication forms for Login and Signup using Tailwind CSS in React. You&apos;ll also understand how to make these forms functional using the third-party Authentication service LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/modern-login-signup-form-tailwindcss-react/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>27</timeToReadBlog><authorImage>https://github.com/FuzzySid.png?size=100v=40</authorImage></item><item><title><![CDATA[GovTech is On The Rise: How Can This Technology Improve Government Services?]]></title><description><![CDATA[GovTech refers to the efforts to digitally transform public administrations and various government and public sector organizations through innovative technological solutions. This post will help you understand the aspects of GovTech and how it’s offering endless opportunities for the sake of citizens’ benefits.]]></description><link>https://www.loginradius.com/blog/identity/govtech-shaping-future-gov-services/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/govtech-shaping-future-gov-services/</guid><category><![CDATA[govtech]]></category><category><![CDATA[digital-transformation]]></category><category><![CDATA[consumer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 13 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2a0b1f4461b02079075f9df8eb00f8c8/7f8e9/govtech.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; GovTech refers to the efforts to digitally transform public administrations and various government and public sector organizations through innovative technological solutions. This post will help you understand the aspects of GovTech and how it’s offering endless opportunities for the sake of citizens’ benefits. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/govtech-shaping-future-gov-services/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Signs Your Traditional IAM System Needs a CIAM Makeover]]></title><description><![CDATA[Businesses are still relying on old-school login and authentication mechanisms, including organization-level IAM, which is why their business lags behind their competitors. Let’s discuss why businesses need to replace their traditional IAM with new-age CIAM.]]></description><link>https://www.loginradius.com/blog/growth/5-signs-ciam-over-traditional-iam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/5-signs-ciam-over-traditional-iam/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[login authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ed30d76a9dc507daabd603133f7f2063/7f8e9/traditional-iam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses are still relying on old-school login and authentication mechanisms, including organization-level IAM, which is why their business lags behind their competitors. Let’s discuss why businesses need to replace their traditional IAM with new-age CIAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/5-signs-ciam-over-traditional-iam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[ 5 Access Management Best Practices and Benefits For Businesses]]></title><description><![CDATA[Access management is essential for modern businesses. This blog will walk you through the five access management best practices to help you keep your systems reserved for valid users only.]]></description><link>https://www.loginradius.com/blog/identity/5-access-management-best-practices-enterprises/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/5-access-management-best-practices-enterprises/</guid><category><![CDATA[zero trust]]></category><category><![CDATA[mfa]]></category><category><![CDATA[enterprise security]]></category><category><![CDATA[access control]]></category><dc:creator><![CDATA[Vikas Kalwani]]></dc:creator><pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/76341870bfe8f96f2b3518b3d7e58850/7f8e9/access-mangmt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Access management is essential for modern businesses. This blog will walk you through the five access management best practices to help you keep your systems reserved for valid users only. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/5-access-management-best-practices-enterprises/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vikas Kalwani&amp;size=100</authorImage></item><item><title><![CDATA[M2M Authorization: Authenticate Apps, APIs, and Web Services]]></title><description><![CDATA[How can you ensure APIs, web services, and business systems communicate and access the information securely without human intervention? The answer is machine-to-machine (M2M) authorization.]]></description><link>https://www.loginradius.com/blog/engineering/using-m2m-authorization-for-apis-and-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/using-m2m-authorization-for-apis-and-apps/</guid><category><![CDATA[M2M]]></category><category><![CDATA[Authorization]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 29 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3bc71bb07579a270c5e9796bf616c58b/58556/m2m-authorization-for-apis-apps-and-web-services.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How can you ensure APIs, web services, and business systems communicate and access the information securely without human intervention? The answer is machine-to-machine (M2M) authorization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/using-m2m-authorization-for-apis-and-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Decoding the Importance of People’s in Customer IAM]]></title><description><![CDATA[As the market becomes increasingly competitive, it’s important to recognize that people are more than just customers. They are advocates and influencers, and they can make or break your business. But how do you keep them engaged? This blog will help you find out how.]]></description><link>https://www.loginradius.com/blog/growth/people-important-in-customer-iam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/people-important-in-customer-iam/</guid><category><![CDATA[omnichannel]]></category><category><![CDATA[customer experience]]></category><category><![CDATA[identity management]]></category><category><![CDATA[digital identity]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 29 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1d08547da3d1767724602b4aedc93e44/7f8e9/people-iam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As the market becomes increasingly competitive, it’s important to recognize that people are more than just customers. They are advocates and influencers, and they can make or break your business. But how do you keep them engaged? This blog will help you find out how. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/people-important-in-customer-iam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Releases Consumer Identity Trend Report 2022, Key Login Methods Highlighted]]></title><description><![CDATA[As a company strongly focused on CIAM, LoginRadius analyzed its global customers over the past year and compiled over 40 unique trends in its annual Consumer Identity Trend report 2022.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-consumer-identity-trend-report-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-consumer-identity-trend-report-2022/</guid><category><![CDATA[industry-news]]></category><category><![CDATA[consumer-identity]]></category><category><![CDATA[identity-trends]]></category><category><![CDATA[digital-identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4132dee4b3c9f2070be747e6fdf7e33/7f8e9/report-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a company strongly focused on CIAM, LoginRadius analyzed its global customers over the past year and compiled over 40 unique trends in its annual Consumer Identity Trend report 2022. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-consumer-identity-trend-report-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Implement HTTP Streaming with Node.js and Fetch API]]></title><description><![CDATA[Do you know that you can stream HTTP data for efficient visualization? Learn more about how you can stream data with HTTP using Node.js and Fetch API.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/http-streaming-with-nodejs-and-fetch-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/http-streaming-with-nodejs-and-fetch-api/</guid><category><![CDATA[Node.js]]></category><category><![CDATA[Fetch API]]></category><category><![CDATA[Streaming]]></category><dc:creator><![CDATA[Nick Van Nieuwenhuyse]]></dc:creator><pubDate>Wed, 27 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e38eeb01b3a5ba1c6afe8f7ebbb43a6b/58556/http-streaming-with-nodejs-and-fetch-api.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Do you know that you can stream HTTP data for efficient visualization? Learn more about how you can stream data with HTTP using Node.js and Fetch API. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/http-streaming-with-nodejs-and-fetch-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/Nivani.png?size=100v=40</authorImage></item><item><title><![CDATA[NestJS: How to Implement Session-Based User Authentication]]></title><description><![CDATA[Want to implement user authentication for your NestJS apps? Follow this tutorial to learn how you can implement session-based authentication for your NestJS apps along with MongoDB.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/session-authentication-with-nestjs-and-mongodb/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/session-authentication-with-nestjs-and-mongodb/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[NestJS]]></category><category><![CDATA[MongoDB]]></category><category><![CDATA[Node.js]]></category><dc:creator><![CDATA[Ekekenta Odionyenfe Clinton]]></dc:creator><pubDate>Tue, 26 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c08a732623e225933ce7293ad4d43437/58556/session-based-authentication-in-nestjs.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Want to implement user authentication for your NestJS apps? Follow this tutorial to learn how you can implement session-based authentication for your NestJS apps along with MongoDB. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/session-authentication-with-nestjs-and-mongodb/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>26</timeToReadBlog><authorImage>https://github.com/icode247.png?size=100v=40</authorImage></item><item><title><![CDATA[How Should Growth-Minded Enterprises Approach Customer Security?]]></title><description><![CDATA[Customer security is crucial for any business striving to stay ahead of the competition. However, balancing customer security with a rich consumer experience is what it all takes to propel growth. Learn the aspects of a robust CIAM solution and how it helps businesses stay ahead of their competitors.]]></description><link>https://www.loginradius.com/blog/growth/how-businesses-approach-customer-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-businesses-approach-customer-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><category><![CDATA[ciam]]></category><category><![CDATA[customer experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 22 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e193f646ae4ac7bc553042b2dc16ba4f/7f8e9/growth-comp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customer security is crucial for any business striving to stay ahead of the competition. However, balancing customer security with a rich consumer experience is what it all takes to propel growth. Learn the aspects of a robust CIAM solution and how it helps businesses stay ahead of their competitors. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-businesses-approach-customer-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[BITB Attacks: The New Destructive Phishing Technique]]></title><description><![CDATA[The browser in the browser attack (BITB) is the latest form of phishing scam that simulates a browser window within a web browser and steals sensitive user information. Let’s understand the aspects of Browser in-browser attacks and how businesses can ensure stringent security for their consumers and employees to protect against these attacks.]]></description><link>https://www.loginradius.com/blog/identity/what-is-browser-in-browser-attack/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-browser-in-browser-attack/</guid><category><![CDATA[phishing]]></category><category><![CDATA[sso]]></category><category><![CDATA[identity-theft]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Gurjyot Singh]]></dc:creator><pubDate>Fri, 22 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7f778f575cf9715afd3f6fb39f034320/58556/bib-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The browser in the browser attack (BITB) is the latest form of phishing scam that simulates a browser window within a web browser and steals sensitive user information. Let’s understand the aspects of Browser in-browser attacks and how businesses can ensure stringent security for their consumers and employees to protect against these attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-browser-in-browser-attack/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Gurjyot Singh&amp;size=100</authorImage></item><item><title><![CDATA[Managing Privacy and Compliance in a Cookieless World]]></title><description><![CDATA[Businesses need to gear up for the new reality and ensure they create a perfect harmony while adhering to the privacy and compliances while delivering a seamless user experience simultaneously. Let’s look at some crucial aspects that businesses must adapt to remain compliant and grow in a cookieless world.]]></description><link>https://www.loginradius.com/blog/growth/manage-privacy-compliance-in-cookieless-world/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/manage-privacy-compliance-in-cookieless-world/</guid><category><![CDATA[data security]]></category><category><![CDATA[privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/93e5c9825bd69913fbd854b7431604ba/7f8e9/cookieless-world.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses need to gear up for the new reality and ensure they create a perfect harmony while adhering to the privacy and compliances while delivering a seamless user experience simultaneously. Let’s look at some crucial aspects that businesses must adapt to remain compliant and grow in a cookieless world. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/manage-privacy-compliance-in-cookieless-world/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Reasons Why You Need to Strengthen Your Identity Authentication]]></title><description><![CDATA[A weak line of defense and poor authentication mechanism at the service providers’ could tarnish a brand's reputation in the global markets and eventually entitle the organization to pay hefty fines. Read on to know more about identity authentication and how it paves the path for businesses embarking on a digital transformation journey.]]></description><link>https://www.loginradius.com/blog/identity/why-business-needs-robust-identity-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/why-business-needs-robust-identity-authentication/</guid><category><![CDATA[identity authentication]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/934a142a13e9ca4f7a3aea659ad0df36/7f8e9/identity-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A weak line of defense and poor authentication mechanism at the service providers’ could tarnish a brand&apos;s reputation in the global markets and eventually entitle the organization to pay hefty fines. Read on to know more about identity authentication and how it paves the path for businesses embarking on a digital transformation journey. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/why-business-needs-robust-identity-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is the Difference Between MFA vs. SSO?]]></title><description><![CDATA[Security and user experience are all that a modern online platform demands. And businesses need to create a perfect harmony between security and usability to witness growth. Let’s understand the aspects of MFA vs. SSO in detail and learn how businesses can leverage MFA and SSO to scale growth, ensure security, and maintain a rich consumer experience.]]></description><link>https://www.loginradius.com/blog/identity/mfa-vs-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mfa-vs-sso/</guid><category><![CDATA[authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[sso]]></category><category><![CDATA[ciam]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 12 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d94463976edf35ad47ee5745dc0201b8/7f8e9/sso-vs-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security and user experience are all that a modern online platform demands. And businesses need to create a perfect harmony between security and usability to witness growth. Let’s understand the aspects of MFA vs. SSO in detail and learn how businesses can leverage MFA and SSO to scale growth, ensure security, and maintain a rich consumer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mfa-vs-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Integrate Invisible reCAPTCHA for Bot Protection]]></title><description><![CDATA[If you only want to integrate reCAPTCHA invisibly on specific pages, LoginRadius can help you. This tutorial explains how you can quickly integrate invisible reCAPTCHA.]]></description><link>https://www.loginradius.com/blog/engineering/integrate-invisible-captcha-for-bot-protection/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/integrate-invisible-captcha-for-bot-protection/</guid><category><![CDATA[reCAPTCHA]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Fri, 08 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8a146c57decdef4899cbaa4abd69ba6/58556/configure-invisible-reCAPTCHA.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you only want to integrate reCAPTCHA invisibly on specific pages, LoginRadius can help you. This tutorial explains how you can quickly integrate invisible reCAPTCHA. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/integrate-invisible-captcha-for-bot-protection/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[How Implementing the Right Identity Strategy Can Grow Your Business?]]></title><description><![CDATA[The right identity strategy can help businesses stay up and running even in challenging situations since enterprises can rely on valuable consumer insights, including their preferences, behavior, and purchase trends. Let’s understand the role of identity management and how a good strategy for managing consumer identities can help businesses excel in growth.]]></description><link>https://www.loginradius.com/blog/growth/grow-business-with-right-identity-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/grow-business-with-right-identity-strategy/</guid><category><![CDATA[consumer iam solution]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 07 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/49f5a5e7ca98a60e266bd0ba5d958929/7f8e9/id-strategy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The right identity strategy can help businesses stay up and running even in challenging situations since enterprises can rely on valuable consumer insights, including their preferences, behavior, and purchase trends. Let’s understand the role of identity management and how a good strategy for managing consumer identities can help businesses excel in growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/grow-business-with-right-identity-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Login Authentication?]]></title><description><![CDATA[Login authentication is the most common scenario where we’re asked to authenticate ourselves. Let’s look at some aspects and challenges of implementing a seamless authentication mechanism and learn how businesses can deliver a seamless user experience through a CIAM.]]></description><link>https://www.loginradius.com/blog/identity/what-is-login-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-login-authentication/</guid><category><![CDATA[login authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 07 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c62a42665c7b5d5ad26be6d15bf9878a/7f8e9/login-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Login authentication is the most common scenario where we’re asked to authenticate ourselves. Let’s look at some aspects and challenges of implementing a seamless authentication mechanism and learn how businesses can deliver a seamless user experience through a CIAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-login-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[5 Ways to Improve Your Customer Verification Process]]></title><description><![CDATA[In the wake of recent data breaches, many companies are realizing that they need to improve their customer verification process. Learn how to improve the process and make it easy and secure for your customers.]]></description><link>https://www.loginradius.com/blog/identity/how-to-improve-customer-verification-process/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-improve-customer-verification-process/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[customer identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Gaurav Belani]]></dc:creator><pubDate>Mon, 04 Apr 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5098c993666a7992eb3c2032d22be6e7/7f8e9/customer-verifcn.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the wake of recent data breaches, many companies are realizing that they need to improve their customer verification process. Learn how to improve the process and make it easy and secure for your customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-improve-customer-verification-process/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Gaurav Belani&amp;size=100</authorImage></item><item><title><![CDATA[5 Myths About Phishing You Should Know]]></title><description><![CDATA[Most of us think we can spot a phishing email, but are we really safe against online fraud? Here are some truths about credential phishing.]]></description><link>https://www.loginradius.com/blog/identity/5-myths-about-phishing-attack/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/5-myths-about-phishing-attack/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Lucy Manole]]></dc:creator><pubDate>Mon, 28 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/73126ce7980898ecc3dd8933607169c1/7f8e9/phish-email.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Most of us think we can spot a phishing email, but are we really safe against online fraud? Here are some truths about credential phishing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/5-myths-about-phishing-attack/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucy Manole&amp;size=100</authorImage></item><item><title><![CDATA[How Lapsus$ Breached Okta and What Organizations Should Learn]]></title><description><![CDATA[Businesses have to be extra vigilant in safeguarding customer data. Minor mistakes can cause a massive data breach, violating data privacy regulations and attracting penalties from regulatory authorities.]]></description><link>https://www.loginradius.com/blog/engineering/okta-and-the-lapsus-breach/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/okta-and-the-lapsus-breach/</guid><category><![CDATA[Breach]]></category><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Fri, 25 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b10aee82003518721b8e81b9cdfb6b0/58556/how-lapsus-breached-okta.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses have to be extra vigilant in safeguarding customer data. Minor mistakes can cause a massive data breach, violating data privacy regulations and attracting penalties from regulatory authorities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/okta-and-the-lapsus-breach/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[NestJS User Authentication with LoginRadius API]]></title><description><![CDATA[Want to authenticate users on your NestJS app? Follow this tutorial to learn how to authenticate users using a password and perform authorization using access tokens.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/nestjs-authentication-with-loginradius-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/nestjs-authentication-with-loginradius-api/</guid><category><![CDATA[NestJS]]></category><category><![CDATA[Node.js]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Mary Gathoni]]></dc:creator><pubDate>Wed, 23 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ff122b5b50ce0f2b3f855935f99838f6/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Want to authenticate users on your NestJS app? Follow this tutorial to learn how to authenticate users using a password and perform authorization using access tokens. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/nestjs-authentication-with-loginradius-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>12</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Mary Gathoni&amp;size=100</authorImage></item><item><title><![CDATA[Tips to Make Verification Emails Effective: Best Practices & Examples]]></title><description><![CDATA[The verification email can impact authentication, communication, and customer journey. Learn how to draft an effective verification email.]]></description><link>https://www.loginradius.com/blog/growth/best-practices-verification-emails-effective/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/best-practices-verification-emails-effective/</guid><dc:creator><![CDATA[Maxim Grigoryev]]></dc:creator><pubDate>Mon, 21 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eb0030368a201aceeb56951ff5cbc4b2/58556/verification-email.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The verification email can impact authentication, communication, and customer journey. Learn how to draft an effective verification email. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/best-practices-verification-emails-effective/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Maxim Grigoryev&amp;size=100</authorImage></item><item><title><![CDATA[4 Common Security Issues Found In Password-Based Login]]></title><description><![CDATA[Password-based login is the most commonly used form of authentication, but it's not always the most secure. This blog covers some of the common security issues found in password-based login systems and how to avoid them.]]></description><link>https://www.loginradius.com/blog/identity/common-vulnerabilities-password-based-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/common-vulnerabilities-password-based-login/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[cx]]></category><category><![CDATA[mfa]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 17 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/97776ba8482721d8665816cf79327393/7f8e9/password-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Password-based login is the most commonly used form of authentication, but it&apos;s not always the most secure. This blog covers some of the common security issues found in password-based login systems and how to avoid them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/common-vulnerabilities-password-based-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Driving Revenue Using LoginRadius' Customer Segmentation Insights]]></title><description><![CDATA[Understanding your potential customers’ exact needs and offering the same is the key to business success. Let’s understand how LoginRadius CIAM helps businesses scale and stay ahead of their competition even in the most unpredictable times.]]></description><link>https://www.loginradius.com/blog/growth/scale-business-with-loginradius-customer-segmentation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/scale-business-with-loginradius-customer-segmentation/</guid><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 15 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bcb8534c55bb8e25d4b615fac9b2b948/7f8e9/customer-segmt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Understanding your potential customers’ exact needs and offering the same is the key to business success. Let’s understand how LoginRadius CIAM helps businesses scale and stay ahead of their competition even in the most unpredictable times. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/scale-business-with-loginradius-customer-segmentation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[5 Reasons Why Frictionless Payments Matter To Marketers And Business Owners]]></title><description><![CDATA[When it comes to frictionless payments, most brands ignore that a bit of hustle in the overall payment process could encourage their users to switch. Let’s understand why frictionless payments matter today more than ever before, especially for business owners and marketers.]]></description><link>https://www.loginradius.com/blog/growth/role-of-frictionless-payments-for-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/role-of-frictionless-payments-for-businesses/</guid><category><![CDATA[omnichannel cx]]></category><category><![CDATA[authentication]]></category><category><![CDATA[user experience]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 11 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7d166028a3824f787dfb23fab6f6a2c5/7f8e9/frictionless-paymt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When it comes to frictionless payments, most brands ignore that a bit of hustle in the overall payment process could encourage their users to switch. Let’s understand why frictionless payments matter today more than ever before, especially for business owners and marketers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/role-of-frictionless-payments-for-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Personal Information and PII - What’s the Difference?]]></title><description><![CDATA[Before organizations gear up to offer stringent security measures to their clients, it’s crucial to understand the fundamental difference between personal data and personally identifiable information (PII).]]></description><link>https://www.loginradius.com/blog/identity/difference-between-personal-info-pii/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/difference-between-personal-info-pii/</guid><category><![CDATA[data security]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 10 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f3d00133cf74918340473da12ae022ef/7f8e9/pii.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Before organizations gear up to offer stringent security measures to their clients, it’s crucial to understand the fundamental difference between personal data and personally identifiable information (PII). &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/difference-between-personal-info-pii/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How to Authenticate Svelte Apps]]></title><description><![CDATA[Are you building Svelte apps? In this tutorial, you'll learn to add secure user authentication in your Svelte apps using LoginRadius APIs.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/authenticating-svelte-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/authenticating-svelte-apps/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Svelte]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Siddhant Varma]]></dc:creator><pubDate>Thu, 10 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c47b7b41ce6f525c5d8fa037d7313ae0/58556/authenticate-svelte-apps.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you building Svelte apps? In this tutorial, you&apos;ll learn to add secure user authentication in your Svelte apps using LoginRadius APIs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/authenticating-svelte-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>21</timeToReadBlog><authorImage>https://github.com/FuzzySid.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Mistakes Companies Make During Digitization And Their Fixes]]></title><description><![CDATA[Today, most companies realize that technology presents an opportunity to transform their business models and products. But, not many have any clue about the mistakes they make while adopting.]]></description><link>https://www.loginradius.com/blog/growth/7-mistakes-companies-make-during-digital-transformation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/7-mistakes-companies-make-during-digital-transformation/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Hazel Raoult]]></dc:creator><pubDate>Mon, 07 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a25b629394d0e38b1a11c127c8b9bbeb/7f8e9/digitize-mistakes.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, most companies realize that technology presents an opportunity to transform their business models and products. But, not many have any clue about the mistakes they make while adopting. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/7-mistakes-companies-make-during-digital-transformation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hazel Raoult&amp;size=100</authorImage></item><item><title><![CDATA[OTT Platforms and CIAM: How Identity Management Ensures Millions of Viewers to Scale with Ease]]></title><description><![CDATA[Today, handling billions of identities is a steep climb for media businesses, especially when every viewer demands an omnichannel experience. Let’s understand how a consumer identity and access management solution could help OTT platforms to handle scalability-related dilemmas like a breeze.]]></description><link>https://www.loginradius.com/blog/identity/how-ciam-helps-ott-platforms-scale-million-viewers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-ciam-helps-ott-platforms-scale-million-viewers/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 07 Mar 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/731f512b29daf74cc8ca719fb2f6f2ea/7f8e9/ciam-ott.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, handling billions of identities is a steep climb for media businesses, especially when every viewer demands an omnichannel experience. Let’s understand how a consumer identity and access management solution could help OTT platforms to handle scalability-related dilemmas like a breeze. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-ciam-helps-ott-platforms-scale-million-viewers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Build Your Github Profile]]></title><description><![CDATA[Your GitHub profile is vital in showcasing your programming skills. Learn how you can leverage GitHub profile to showcase your skills and expertise.]]></description><link>https://www.loginradius.com/blog/engineering/build-your-github-profile/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/build-your-github-profile/</guid><category><![CDATA[Github]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Mon, 28 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9538f6a4bb1b02fa3b5daf9e83f0e026/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Your GitHub profile is vital in showcasing your programming skills. Learn how you can leverage GitHub profile to showcase your skills and expertise. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/build-your-github-profile/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Implement Search Functionality for Your Websites]]></title><description><![CDATA[Adding a search functionality is important for any website to improve user experience. Read more to understand the benefits of enabling search on your website.]]></description><link>https://www.loginradius.com/blog/engineering/importance-of-search-functionality-for-websites/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/importance-of-search-functionality-for-websites/</guid><category><![CDATA[Search]]></category><dc:creator><![CDATA[Neha Vyas]]></dc:creator><pubDate>Thu, 24 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/455ec841671081b53edc59522c28a138/58556/search-functionality.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Adding a search functionality is important for any website to improve user experience. Read more to understand the benefits of enabling search on your website. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/importance-of-search-functionality-for-websites/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/nehavyasqa.png?size=100v=40</authorImage></item><item><title><![CDATA[Is the Rise of Machine Identity Posing a Threat to Enterprise Security?]]></title><description><![CDATA[Cybercriminals are always on the hunt to exploit a loophole in the overall security mechanism in the digital world where machine-to-machine communication is the new normal. It’s no longer enough to assume services/devices accessing sensitive data can be trusted.]]></description><link>https://www.loginradius.com/blog/identity/rise-of-machine-identity-m2m-authorization-role/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/rise-of-machine-identity-m2m-authorization-role/</guid><category><![CDATA[data security]]></category><category><![CDATA[authorization]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 24 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80509e9a73e5522ade29fd937262e0d4/7f8e9/machine-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybercriminals are always on the hunt to exploit a loophole in the overall security mechanism in the digital world where machine-to-machine communication is the new normal. It’s no longer enough to assume services/devices accessing sensitive data can be trusted. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/rise-of-machine-identity-m2m-authorization-role/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Can Retailers Lead The Experience Economy While Securing Consumer Identities?]]></title><description><![CDATA[Retail businesses must leverage cutting-edge technology that helps them attract users that convert into buyers. Identity management in the retail industry is a seamless, secure, and scalable solution to identify and protect customer data and ensure that they can easily access any information they need.]]></description><link>https://www.loginradius.com/blog/growth/how-retailers-balance-security-ux/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-retailers-balance-security-ux/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 23 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/23a396f003f96b6523d1f65946ca9c4b/7f8e9/retailers-balance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Retail businesses must leverage cutting-edge technology that helps them attract users that convert into buyers. Identity management in the retail industry is a seamless, secure, and scalable solution to identify and protect customer data and ensure that they can easily access any information they need. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-retailers-balance-security-ux/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Flutter Authentication: Implementing User Signup and Login]]></title><description><![CDATA[Developing Flutter apps? Learn how to implement user authentication and registration in your Flutter applications quickly with LoginRadius APIs.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/authenticating-flutter-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/authenticating-flutter-apps/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Flutter]]></category><category><![CDATA[API]]></category><dc:creator><![CDATA[Yusuf Ahmed]]></dc:creator><pubDate>Thu, 17 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/97c4aaf6f0e898b457c0574ba1f8c979/58556/user-authentication-for-flutter-apps.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Developing Flutter apps? Learn how to implement user authentication and registration in your Flutter applications quickly with LoginRadius APIs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/authenticating-flutter-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>30</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Yusuf Ahmed&amp;size=100</authorImage></item><item><title><![CDATA[The Right Way to Use Identity Marketing in a Privacy-Centric World]]></title><description><![CDATA[There are numerous ways that you can use identity marketing to strengthen your business reputation. With the right techniques, you can make this an extremely powerful strategy. The points mentioned in this blog will help you to understand how identity marketing has transformed the modern digital age.]]></description><link>https://www.loginradius.com/blog/growth/how-to-use-identity-marketing-privacy-centric-world/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-use-identity-marketing-privacy-centric-world/</guid><category><![CDATA[identity management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 15 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1ef6d61c0e7976345607c10e60f0e03/7f8e9/identity-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; There are numerous ways that you can use identity marketing to strengthen your business reputation. With the right techniques, you can make this an extremely powerful strategy. The points mentioned in this blog will help you to understand how identity marketing has transformed the modern digital age. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-use-identity-marketing-privacy-centric-world/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Integrates Search in Navigation for Better Customer Experience]]></title><description><![CDATA[Being a CIAM solution, LoginRadius understands the importance of customer experience. From time to time, we take a look back in the Admin Console and keep improvising it. This time we worked on the Search in navigation.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-integrates-search-navigation-better-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-integrates-search-navigation-better-cx/</guid><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Archna Yadav]]></dc:creator><pubDate>Tue, 15 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3d8db917933a71d38be2d1adf1a72a50/7f8e9/LR-search-navigation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Being a CIAM solution, LoginRadius understands the importance of customer experience. From time to time, we take a look back in the Admin Console and keep improvising it. This time we worked on the Search in navigation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-integrates-search-navigation-better-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Archna Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Why Should You Use OTT Authentication in Your Lead Generation Funnel?]]></title><description><![CDATA[Adding a stringent authentication mechanism through a CIAM solution that ensures robust security and enhances user experience is the need of the hour for every OTT platform. Let’s understand the aspects of incorporating OTT authentication for OTT platforms and why it’s crucial from a lead generation perspective.]]></description><link>https://www.loginradius.com/blog/growth/ott-authentication-boost-lead-generation-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ott-authentication-boost-lead-generation-2022/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[sso]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 11 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/906bef38cf708283480950e76f1cd8df/7f8e9/ott-lead.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Adding a stringent authentication mechanism through a CIAM solution that ensures robust security and enhances user experience is the need of the hour for every OTT platform. Let’s understand the aspects of incorporating OTT authentication for OTT platforms and why it’s crucial from a lead generation perspective. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ott-authentication-boost-lead-generation-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[5 Privacy Threats in Social Media You Should Know in 2022]]></title><description><![CDATA[With the rise in a number of highly publicized cybersecurity breaches, businesses and consumers must remain vigilant to protect sensitive information on social media. There is no doubt that cyber threats will continue to rise over the next few years, so being prepared is key.]]></description><link>https://www.loginradius.com/blog/identity/social-media-privacy-threats-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/social-media-privacy-threats-2022/</guid><category><![CDATA[social login]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Nikola Sekulic]]></dc:creator><pubDate>Fri, 11 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f0630921c6ace29db33dd8ca737c19f8/7f8e9/social-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the rise in a number of highly publicized cybersecurity breaches, businesses and consumers must remain vigilant to protect sensitive information on social media. There is no doubt that cyber threats will continue to rise over the next few years, so being prepared is key. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/social-media-privacy-threats-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Nikola Sekulic&amp;size=100</authorImage></item><item><title><![CDATA[Importance of Multi-factor Authentication for SSO]]></title><description><![CDATA[Multi-factor authentication (MFA) is an essential layer of security that’s becoming standard in enterprise SSO deployments. While it’s not a silver bullet, it’s likely the last line of defense in most situations, so its importance shouldn’t be overlooked. Here’s an insightful read depicting the aspects of SSO authentication and MFA.]]></description><link>https://www.loginradius.com/blog/identity/why-multi-factor-authentication-imp-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/why-multi-factor-authentication-imp-sso/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[sso]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Conrad Sturdy]]></dc:creator><pubDate>Tue, 08 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/016128b536f5bd62793d5843aa5ea98e/7f8e9/mfa-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Multi-factor authentication (MFA) is an essential layer of security that’s becoming standard in enterprise SSO deployments. While it’s not a silver bullet, it’s likely the last line of defense in most situations, so its importance shouldn’t be overlooked. Here’s an insightful read depicting the aspects of SSO authentication and MFA. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/why-multi-factor-authentication-imp-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Conrad Sturdy&amp;size=100</authorImage></item><item><title><![CDATA[How to Create Brand Identity to Attract More Customers]]></title><description><![CDATA[Branding is composed of so much more other than just your logo and chosen brand colors. Developing customer identity is also a must when it comes to getting your brand out for consumers. These tips will help you refine your branding to suit the goals of your business.]]></description><link>https://www.loginradius.com/blog/growth/improve-customer-relation-brand-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improve-customer-relation-brand-identity/</guid><category><![CDATA[identity management]]></category><category><![CDATA[customer identity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Mike Abelson]]></dc:creator><pubDate>Fri, 04 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/85d700466c0612e8377e48c9b9921442/7f8e9/brand-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Branding is composed of so much more other than just your logo and chosen brand colors. Developing customer identity is also a must when it comes to getting your brand out for consumers. These tips will help you refine your branding to suit the goals of your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improve-customer-relation-brand-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Mike Abelson&amp;size=100</authorImage></item><item><title><![CDATA[How LoginRadius Creates a Perfect Harmony of UX and Security]]></title><description><![CDATA[Enterprises must be aware that the secret to success lies in quickly identifying and eliminating any troubles and pain points that occur when consumers interact with their organization. A robust CIAM like LoginRadius helps eliminate security and user experience challenges like a breeze.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-creates-trusted-digital-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-creates-trusted-digital-experience/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 04 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9fd1a230bd0b40ab98e0558c79af7494/7f8e9/digital-exp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Enterprises must be aware that the secret to success lies in quickly identifying and eliminating any troubles and pain points that occur when consumers interact with their organization. A robust CIAM like LoginRadius helps eliminate security and user experience challenges like a breeze. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-creates-trusted-digital-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Secure Your LoopBack REST API with JWT Authentication]]></title><description><![CDATA[Are you building dynamic REST APIs with LoopBack? In this tutorial, you'll learn how to implement user authentication and authorization in a Loopback REST API.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/loopback-rest-api-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/loopback-rest-api-authentication/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[LoopBack]]></category><category><![CDATA[JWT]]></category><category><![CDATA[Node.js]]></category><dc:creator><![CDATA[Ekekenta Odionyenfe Clinton]]></dc:creator><pubDate>Fri, 04 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4a5b6d544acaf9e9a42893f7df9dd057/58556/secure-loopback-rest-api-with-jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you building dynamic REST APIs with LoopBack? In this tutorial, you&apos;ll learn how to implement user authentication and authorization in a Loopback REST API. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/loopback-rest-api-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>18</timeToReadBlog><authorImage>https://github.com/icode247.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Make a Strong Impression With Your Onboarding Process?]]></title><description><![CDATA[The key to a seamless onboarding experience is to make the process as simple and safe as possible – from the first moment a new customer accesses your site until the moment they are authenticated and logged in. This article explains how.]]></description><link>https://www.loginradius.com/blog/growth/smooth-onboarding-positive-user-impression/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/smooth-onboarding-positive-user-impression/</guid><category><![CDATA[user onboarding]]></category><category><![CDATA[progressive profiling]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 02 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/04138a7e4d9a15c02695118964305452/7f8e9/onboarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The key to a seamless onboarding experience is to make the process as simple and safe as possible – from the first moment a new customer accesses your site until the moment they are authenticated and logged in. This article explains how. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/smooth-onboarding-positive-user-impression/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Smart Cities and Cyber Security Trends to Watch Out in 2022]]></title><description><![CDATA[Attackers explore new ways to exploit organizations by targeting their employees and users by surpassing frail security mechanisms in the past few years. Here’s a list of potential security trends that every individual, business, or organization must keep in mind and ensure they remain safe by adopting appropriate security measures.]]></description><link>https://www.loginradius.com/blog/identity/smart-citiy-cybersecurity-trends-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/smart-citiy-cybersecurity-trends-2022/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 02 Feb 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6beb4f7f5374e8f8e1052e9585deaed1/7f8e9/smart-cities.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Attackers explore new ways to exploit organizations by targeting their employees and users by surpassing frail security mechanisms in the past few years. Here’s a list of potential security trends that every individual, business, or organization must keep in mind and ensure they remain safe by adopting appropriate security measures. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/smart-citiy-cybersecurity-trends-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[When Can Developers Get Rid of Password-based Authentication?]]></title><description><![CDATA[Authentication remains at the core of any application with user data and accounts. It ensures that only the authorized person is accessing the data and account. So far, Password-based authentication has been prevalent that developers mostly use.]]></description><link>https://www.loginradius.com/blog/engineering/developers-can-get-rid-of-password-based-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/developers-can-get-rid-of-password-based-authentication/</guid><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 31 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c9cb7d184cd59f1d58470baae77763e1/58556/password-dev.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication remains at the core of any application with user data and accounts. It ensures that only the authorized person is accessing the data and account. So far, Password-based authentication has been prevalent that developers mostly use. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/developers-can-get-rid-of-password-based-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[4 Ways to Extend CIAM Capabilities of BigCommerce]]></title><description><![CDATA[Want to add Phone Login or Single Sign-on for customers of your BigCommerce application? This article explains it all. Towards the end, it talks about how LoginRadius can help you improve upsell and cross-sell.]]></description><link>https://www.loginradius.com/blog/engineering/extend-ciam-capabilities-of-bigcommerce/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/extend-ciam-capabilities-of-bigcommerce/</guid><category><![CDATA[BigCommerce]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[CIAM]]></category><dc:creator><![CDATA[Archna Yadav]]></dc:creator><pubDate>Thu, 27 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8c9fb8572282ac70e1a960bc7c47ec2b/58556/4-ways-to-extend-ciam-capabilities.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Want to add Phone Login or Single Sign-on for customers of your BigCommerce application? This article explains it all. Towards the end, it talks about how LoginRadius can help you improve upsell and cross-sell. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/extend-ciam-capabilities-of-bigcommerce/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Archna Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Harry Rosen, a LoginRadius Customer Success Story]]></title><description><![CDATA[Read our client's success story, Harry Rosen Inc., an e-commerce retailer in Canada. Learn how LoginRadius helped them enhance the onboarding experience with robust security.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-streamlines-user-onboarding-harry-rosen/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-streamlines-user-onboarding-harry-rosen/</guid><category><![CDATA[retail]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Fri, 21 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/96c3643cf4182246c63a93a6f05f8695/7f8e9/harry-rosen.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Read our client&apos;s success story, Harry Rosen Inc., an e-commerce retailer in Canada. Learn how LoginRadius helped them enhance the onboarding experience with robust security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-streamlines-user-onboarding-harry-rosen/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Finding The Balance Between Personalization and Data Privacy]]></title><description><![CDATA[It is increasingly important for businesses to attract and retain customers in an era of digital transformation. In this context, businesses will have to strike a balance between personalization and data privacy.]]></description><link>https://www.loginradius.com/blog/growth/balance-between-personalization-data-privacy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/balance-between-personalization-data-privacy/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Thu, 20 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c913df843290aefcd4962efa7443f05c/7f8e9/personalize-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is increasingly important for businesses to attract and retain customers in an era of digital transformation. In this context, businesses will have to strike a balance between personalization and data privacy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/balance-between-personalization-data-privacy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[Top 7 Security Tips from LoginRadius’ Cybersecurity Expert to Follow in 2023]]></title><description><![CDATA[Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization.]]></description><link>https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[security tips]]></category><category><![CDATA[information security]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 20 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8de3ae8045056a3050b4bdcaea7a7e97/7f8e9/security-exp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Top 7 Security Tips from LoginRadius’ Cybersecurity Expert to Follow in 2023]]></title><description><![CDATA[Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization.]]></description><link>https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2023/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2023/</guid><category><![CDATA[cybersecurity tips]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[digital transformation]]></category><dc:creator><![CDATA[Alok Patidar]]></dc:creator><pubDate>Thu, 20 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8de3ae8045056a3050b4bdcaea7a7e97/7f8e9/security-expert.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2023/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alok Patidar&amp;size=100</authorImage></item><item><title><![CDATA[Unlock the Business Benefits of Change Management in Securing Consumer Identity]]></title><description><![CDATA[If you are one of the many businesses that have not yet developed an effective change management strategy, this article is for you. With new data privacy regulations coming into effect, organizations face complex compliance issues. Ignoring these rules can turn out to be expensive.]]></description><link>https://www.loginradius.com/blog/growth/change-management-consumer-security-tool/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/change-management-consumer-security-tool/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 19 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ef1d42559b143b4e64a3ca9ccaaaa8cd/7f8e9/change-managmt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you are one of the many businesses that have not yet developed an effective change management strategy, this article is for you. With new data privacy regulations coming into effect, organizations face complex compliance issues. Ignoring these rules can turn out to be expensive. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/change-management-consumer-security-tool/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[This Is How Scammers Get Your Email Address & How to Stop Them]]></title><description><![CDATA[When you type your email address into a website, be careful. You might have just given your email address to a scammer. Sadly, this happens all too often and is one of the main ways scammers harvest email addresses. This blog offers solutions on how to stop it from happening.]]></description><link>https://www.loginradius.com/blog/identity/stop-scammers-getting-email-address/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/stop-scammers-getting-email-address/</guid><category><![CDATA[data security]]></category><category><![CDATA[2fa]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 19 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/785e97d501a8bb97e5fe32bfbdfe5534/7f8e9/scammers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When you type your email address into a website, be careful. You might have just given your email address to a scammer. Sadly, this happens all too often and is one of the main ways scammers harvest email addresses. This blog offers solutions on how to stop it from happening. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/stop-scammers-getting-email-address/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Bring Stakeholders Together to Modernize CIAM Across Your Organization]]></title><description><![CDATA[If you’re ready to modernize your CIAM but aren’t quite sure where to start, then this blog should get you on the right path with your stakeholders.]]></description><link>https://www.loginradius.com/blog/growth/stakeholder-engagement-modernize-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/stakeholder-engagement-modernize-ciam/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[convenience]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 18 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7a0efc3c1fd8d3b0fb8c6ab3125a22b0/7f8e9/saas-modernize.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you’re ready to modernize your CIAM but aren’t quite sure where to start, then this blog should get you on the right path with your stakeholders. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/stakeholder-engagement-modernize-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Will Decentralized Auth Change the Perception of Consumer Identities in 2022?]]></title><description><![CDATA[Whether we talk about inappropriate data collection or a loophole in managing consumer identities, anything could lead to compromised sensitive information. Here’s where the concept of decentralized authentication in identity management comes into play.]]></description><link>https://www.loginradius.com/blog/identity/decentralized-authentication-future-of-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/decentralized-authentication-future-of-authentication/</guid><category><![CDATA[authentication]]></category><category><![CDATA[identity verification]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 18 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b012d6c8346bf5fc6a686adb0d71f2e0/7f8e9/dec-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether we talk about inappropriate data collection or a loophole in managing consumer identities, anything could lead to compromised sensitive information. Here’s where the concept of decentralized authentication in identity management comes into play. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/decentralized-authentication-future-of-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Node.js User Authentication Guide]]></title><description><![CDATA[Want to authenticate and manage users with specific roles in your Node.js app? This in-depth tutorial explains everything step-by-step to help you implement authentication in your Node.js apps.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/nodejs-authentication-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/nodejs-authentication-guide/</guid><category><![CDATA[JWT]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Node.js]]></category><dc:creator><![CDATA[Uma Victor]]></dc:creator><pubDate>Tue, 18 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/36e3e372636f4119a2bf4ee3878592ae/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Want to authenticate and manage users with specific roles in your Node.js app? This in-depth tutorial explains everything step-by-step to help you implement authentication in your Node.js apps. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/nodejs-authentication-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>32</timeToReadBlog><authorImage>https://github.com/uma-victor1.png?size=100v=40</authorImage></item><item><title><![CDATA[A Successful Business Review Meeting Paves the Path for Your Business Success]]></title><description><![CDATA[QBRs are the perfect time to showcase your business perspective and the business impact you’ve had on your clients. This is a critical exercise that bridges the gap between your clients, your product/services, and your company.]]></description><link>https://www.loginradius.com/blog/growth/business-review-meeting-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/business-review-meeting-success/</guid><dc:creator><![CDATA[Ritika Kapahi]]></dc:creator><pubDate>Thu, 13 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1403b991eaf6559b872af3be11b07679/7f8e9/business-review.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; QBRs are the perfect time to showcase your business perspective and the business impact you’ve had on your clients. This is a critical exercise that bridges the gap between your clients, your product/services, and your company. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/business-review-meeting-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ritika Kapahi&amp;size=100</authorImage></item><item><title><![CDATA[Emerging Threat of Deepfakes: How To Identify And Prepare Against It]]></title><description><![CDATA[The emergence of deepfakes has led to many questions about how to identify and protect against them. This blog will provide an overview towards providing that understanding.]]></description><link>https://www.loginradius.com/blog/identity/how-to-identity-mitigate-deepfake-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-identity-mitigate-deepfake-attacks/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 13 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4ad3d5620d72d54d3f6ab076c29a5a00/7f8e9/deepfake.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The emergence of deepfakes has led to many questions about how to identify and protect against them. This blog will provide an overview towards providing that understanding. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-identity-mitigate-deepfake-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Your Ultimate Guide to Next.js Authentication]]></title><description><![CDATA[This tutorial describes Next.js authentication patterns and helps you learn step-by-step how to authenticate a Next.js application.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/nextjs-authentication-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/nextjs-authentication-guide/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[React]]></category><category><![CDATA[Next.js]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Emadamerho-Atori Nefe]]></dc:creator><pubDate>Thu, 13 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6a3f9e6ed0b8803f9523875b01d55a37/58556/next-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This tutorial describes Next.js authentication patterns and helps you learn step-by-step how to authenticate a Next.js application. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/nextjs-authentication-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://github.com/nefejames.png?size=100v=40</authorImage></item><item><title><![CDATA[Local Storage vs. Session Storage vs. Cookies]]></title><description><![CDATA[This article helps you understand the differences between browser storage and cookies. By the end, you'll understand when to use cookies and browser storage (both local storage and session storage).]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/local-storage-vs-session-storage-vs-cookies/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/local-storage-vs-session-storage-vs-cookies/</guid><category><![CDATA[Cookie]]></category><category><![CDATA[Browser Storage]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[JWT]]></category><dc:creator><![CDATA[Siddhant Varma]]></dc:creator><pubDate>Wed, 12 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e9788df6bdd55f91b1eccb4382f05573/58556/blog-banner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article helps you understand the differences between browser storage and cookies. By the end, you&apos;ll understand when to use cookies and browser storage (both local storage and session storage). &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/local-storage-vs-session-storage-vs-cookies/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/FuzzySid.png?size=100v=40</authorImage></item><item><title><![CDATA[Multi-Brand Ecommerce: Creating a One-Brand Experience Using SSO]]></title><description><![CDATA[SSO bridges the gap between multiple interconnected platforms and cuts the need for re-authentication for a consumer. Let’s understand how SSO is paving the path for the next generation of e-commerce giants to deliver rich multi-brand experiences across their platforms.]]></description><link>https://www.loginradius.com/blog/growth/multi-brand-ecommerce-experience-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/multi-brand-ecommerce-experience-sso/</guid><category><![CDATA[data security]]></category><category><![CDATA[sso]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 11 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e56e96b096115f95c3d13b046c19f37b/7f8e9/multibrand.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SSO bridges the gap between multiple interconnected platforms and cuts the need for re-authentication for a consumer. Let’s understand how SSO is paving the path for the next generation of e-commerce giants to deliver rich multi-brand experiences across their platforms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/multi-brand-ecommerce-experience-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Everything You Need to Know Before Buying Cyber Insurance in 2022]]></title><description><![CDATA[Before you buy cyber insurance in 2022, make sure you know everything there is to know about it. Learn the ins and outs of what to expect, how much wealth you can save, and more.]]></description><link>https://www.loginradius.com/blog/identity/cyber-insurance-guide-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cyber-insurance-guide-2022/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Tue, 11 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/21cc768262a164f40aa453fce807d26d/7f8e9/cyber-insurance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Before you buy cyber insurance in 2022, make sure you know everything there is to know about it. Learn the ins and outs of what to expect, how much wealth you can save, and more. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cyber-insurance-guide-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Customer Authentication: Unfolding The Market Needs Of The Future]]></title><description><![CDATA[Consumer authentication is getting more challenging than ever. Learn how the biggest brands in the world are innovating their way through the disruption that's already underway, and get the tactics you need to deliver a seamless experience to your customers.]]></description><link>https://www.loginradius.com/blog/growth/future-customer-authentication-market-needs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/future-customer-authentication-market-needs/</guid><category><![CDATA[data security]]></category><category><![CDATA[biometric authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 06 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2b7f37f6b79baa87c2e20c27b0098681/7f8e9/auth-future.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Consumer authentication is getting more challenging than ever. Learn how the biggest brands in the world are innovating their way through the disruption that&apos;s already underway, and get the tactics you need to deliver a seamless experience to your customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/future-customer-authentication-market-needs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[5 Challenges for Government Adoption of Citizens’ Access Control]]></title><description><![CDATA[Various challenges related to different aspects may come across the government agencies while they craft the best experiences.  One such aspect is the citizens’ access control for various services in a state. This post reveals the multiple challenges government agencies face that hinder citizens’ experience.]]></description><link>https://www.loginradius.com/blog/identity/govt-access-control-challenges-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/govt-access-control-challenges-2022/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Thu, 06 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5110a20745dfda8f5495de038a7ef79e/7f8e9/govt-access.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Various challenges related to different aspects may come across the government agencies while they craft the best experiences.  One such aspect is the citizens’ access control for various services in a state. This post reveals the multiple challenges government agencies face that hinder citizens’ experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/govt-access-control-challenges-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[Implementing The Power Of Continuous Authentication for Boundless Business Value]]></title><description><![CDATA[With advancements in technology and the increasing rate of cybercrimes, continuous authentication for business is gaining popularity in modern times. As a smarter and better authentication method, it can help in reducing the number of these attacks.]]></description><link>https://www.loginradius.com/blog/growth/implement-continuous-authentication-business-value/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/implement-continuous-authentication-business-value/</guid><category><![CDATA[continuous authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 04 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/72e94f9a4e2de923dd94f63057db6420/7f8e9/cont-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With advancements in technology and the increasing rate of cybercrimes, continuous authentication for business is gaining popularity in modern times. As a smarter and better authentication method, it can help in reducing the number of these attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/implement-continuous-authentication-business-value/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Are You Thinking of Token Management for Your API Product? Think about JWT!]]></title><description><![CDATA[A token plays a crucial role in enhancing the overall security mechanism of an organization. This post will help you better understand what a token is, what is a JWT, and its pros that will help you decide why you need to invoke the potential of JWT for your API product.]]></description><link>https://www.loginradius.com/blog/identity/token-management-api-product-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/token-management-api-product-jwt/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 04 Jan 2022 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/de67eac4fc7744d3363cf853d8d429d3/7f8e9/token-managmt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A token plays a crucial role in enhancing the overall security mechanism of an organization. This post will help you better understand what a token is, what is a JWT, and its pros that will help you decide why you need to invoke the potential of JWT for your API product. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/token-management-api-product-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 10 Performing Identity Blogs in 2021]]></title><description><![CDATA[Our insightful blogs helped millions of people globally understand, implement, and enhance their platform experience by leveraging cutting-edge technology in the CIAM landscape in 2021. Here we’ve compiled a list of our top-performing blogs of 2021 that can help you quickly find the most admired and insightful posts to solve your purpose.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-top-performing-blogs-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-top-performing-blogs-2021/</guid><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 29 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/412ef6bab129e2dc0cf8b99a5b731955/7f8e9/performing-blogs.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Our insightful blogs helped millions of people globally understand, implement, and enhance their platform experience by leveraging cutting-edge technology in the CIAM landscape in 2021. Here we’ve compiled a list of our top-performing blogs of 2021 that can help you quickly find the most admired and insightful posts to solve your purpose. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-top-performing-blogs-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[React Security Vulnerabilities and How to Fix/Prevent Them]]></title><description><![CDATA[React security vulnerabilities are hard to detect. However, this article talks about the top 7 vulnerabilities and how to fix them to enjoy all the benefits React caters to in developing Progressive Web Applications.]]></description><link>https://www.loginradius.com/blog/engineering/react-security-vulnerabilities/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-security-vulnerabilities/</guid><category><![CDATA[React]]></category><category><![CDATA[Vulnerability]]></category><dc:creator><![CDATA[Gaurav Kumar Roy]]></dc:creator><pubDate>Fri, 24 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9bd496853e1dfc053e95fe44dbb19cc7/58556/react-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; React security vulnerabilities are hard to detect. However, this article talks about the top 7 vulnerabilities and how to fix them to enjoy all the benefits React caters to in developing Progressive Web Applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-security-vulnerabilities/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>15</timeToReadBlog><authorImage>https://github.com/GauravRoy6.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Secure a PHP API Using JWT]]></title><description><![CDATA[This tutorial helps you understand why you should secure your PHP API. Then, it helps you learn how to use JWT with Apache to secure your PHP API.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/securing-php-api-with-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/securing-php-api-with-jwt/</guid><category><![CDATA[PHP]]></category><category><![CDATA[JWT]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Harikrishna Kundariya]]></dc:creator><pubDate>Fri, 24 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9e157a812c5801bd8d6ca83f317ee88/58556/jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This tutorial helps you understand why you should secure your PHP API. Then, it helps you learn how to use JWT with Apache to secure your PHP API. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/securing-php-api-with-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/espark-biz.png?size=100v=40</authorImage></item><item><title><![CDATA[What Should You Ask Your Identity Provider in 2022]]></title><description><![CDATA[CIAM is the backbone of every mobile application or website that collects user information. So, if you’re thinking about getting a CIAM solution, here are some questions that you need to ask your identity provider in 2022.]]></description><link>https://www.loginradius.com/blog/growth/questions-to-ask-your-identity-provider-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/questions-to-ask-your-identity-provider-2022/</guid><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 21 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d041213ab6bca69bb94526978153bba4/7f8e9/id-provider.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIAM is the backbone of every mobile application or website that collects user information. So, if you’re thinking about getting a CIAM solution, here are some questions that you need to ask your identity provider in 2022. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/questions-to-ask-your-identity-provider-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Launches M2M Authorization for Seamless Business Operations]]></title><description><![CDATA[Machine to Machine (M2M) authorization ensures that business systems communicate autonomously without human intervention and access the needed information securely and reliably.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-m2m-authorization-data-access/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-m2m-authorization-data-access/</guid><category><![CDATA[industry-news]]></category><category><![CDATA[authorization]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 15 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ced52bfc8a52c08c841eeee065711480/58556/m2m-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Machine to Machine (M2M) authorization ensures that business systems communicate autonomously without human intervention and access the needed information securely and reliably. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-m2m-authorization-data-access/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Cookie-based vs. Cookieless Authentication: What’s the Future?]]></title><description><![CDATA[Understand how cookie-based and cookieless authentication methods work. And learn their major differences, advantages, and disadvantages.]]></description><link>https://www.loginradius.com/blog/engineering/cookie-based-vs-cookieless-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/cookie-based-vs-cookieless-authentication/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[JWT]]></category><category><![CDATA[Cookie]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0be9d40cc7bb77e9feb433ff59d7514a/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Understand how cookie-based and cookieless authentication methods work. And learn their major differences, advantages, and disadvantages. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/cookie-based-vs-cookieless-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Do Consumer Identity Programs Really Work for Personalized Marketing?]]></title><description><![CDATA[Consumer identity management is actually a great way to help companies grow. It is through high quality CIAM that a business can create better targeted, safer, more meaningful marketing experiences for their customers.]]></description><link>https://www.loginradius.com/blog/growth/consumer-identity-rule-personalized-marketing-2022/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-identity-rule-personalized-marketing-2022/</guid><category><![CDATA[identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/98e924b770d7fc513e3cdb7e99c9804c/58556/personalized-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Consumer identity management is actually a great way to help companies grow. It is through high quality CIAM that a business can create better targeted, safer, more meaningful marketing experiences for their customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-identity-rule-personalized-marketing-2022/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Offers PerfectMind Integration for a Seamless UX]]></title><description><![CDATA[LoginRadius’ cutting-edge single sign-on helps overcome all the challenges related to consumer experience and data integration.  Let’s understand how LoginRadius paves the path for a robust user experience by integrating PerfectMind.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-perfectmind-integration-sso-ux/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-perfectmind-integration-sso-ux/</guid><category><![CDATA[authentication]]></category><category><![CDATA[federated sso]]></category><category><![CDATA[passwordless login]]></category><dc:creator><![CDATA[Jitender Agarwal]]></dc:creator><pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/07f736293e132f8cf0720ca403d55405/58556/perfectmind-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius’ cutting-edge single sign-on helps overcome all the challenges related to consumer experience and data integration.  Let’s understand how LoginRadius paves the path for a robust user experience by integrating PerfectMind. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-perfectmind-integration-sso-ux/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jitender Agarwal&amp;size=100</authorImage></item><item><title><![CDATA[Using JWT Flask JWT Authentication- A Quick Guide]]></title><description><![CDATA[This tutorial helps you build a simple Flask API and demonstrates how to secure it using JWT. In the end, you can test your API authentication using a sample schema.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/securing-flask-api-with-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/securing-flask-api-with-jwt/</guid><category><![CDATA[Flask]]></category><category><![CDATA[JWT]]></category><category><![CDATA[API]]></category><dc:creator><![CDATA[Babatunde Koiki]]></dc:creator><pubDate>Thu, 09 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1cfc51c7d9ade423f3b1992809ba5b1b/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This tutorial helps you build a simple Flask API and demonstrates how to secure it using JWT. In the end, you can test your API authentication using a sample schema. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/securing-flask-api-with-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>32</timeToReadBlog><authorImage>https://github.com/Babatunde13.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Consumers’ Social Identities Matter & How You Can Protect It?]]></title><description><![CDATA[Consumer is king. Organisations have realized this in modern times. Due to globalization, competition has increased, and customers have many choices. Therefore, the best way to get a customer's attention is by providing a product that suits the consumer's social identity.]]></description><link>https://www.loginradius.com/blog/growth/how-to-protect-consumer-social-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-protect-consumer-social-identity/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 07 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d6372dc67eb5b1529e8db22a645a7b1b/58556/social-id.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Consumer is king. Organisations have realized this in modern times. Due to globalization, competition has increased, and customers have many choices. Therefore, the best way to get a customer&apos;s attention is by providing a product that suits the consumer&apos;s social identity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-protect-consumer-social-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Take Control of Your CIAM Environment with LoginRadius' Private Cloud]]></title><description><![CDATA[Businesses relying on conventional consumer IAMs aren’t aware that they’re not just putting their consumer information at risk but are also missing endless business opportunities. This blog explains how LoginRadius’ CIAM solution offers a private cloud that helps businesses take total control over every aspect of their business.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-private-cloud-ciam-benefits/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-private-cloud-ciam-benefits/</guid><category><![CDATA[cloud computing]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 07 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f759bb4df3a168777aed79b55a9f7d67/58556/lr-private-cloud.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses relying on conventional consumer IAMs aren’t aware that they’re not just putting their consumer information at risk but are also missing endless business opportunities. This blog explains how LoginRadius’ CIAM solution offers a private cloud that helps businesses take total control over every aspect of their business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-private-cloud-ciam-benefits/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[Not Sure About Spiderman, But You Can Prevent Identity Disclosure]]></title><description><![CDATA[What's most challenging about identity disclosure is that it is not only hard to avoid but also very difficult to repair once it has been disclosed. So, don't wait for a Mysterio to mess up your consumers’ identities! Security is just a click away with LoginRadius.]]></description><link>https://www.loginradius.com/blog/growth/prevent-identity-disclosure-spiderman/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/prevent-identity-disclosure-spiderman/</guid><category><![CDATA[data security]]></category><category><![CDATA[adaptive authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 02 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/00cd0c19e343658fe2d9e6676e972fb3/58556/spiderman.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What&apos;s most challenging about identity disclosure is that it is not only hard to avoid but also very difficult to repair once it has been disclosed. So, don&apos;t wait for a Mysterio to mess up your consumers’ identities! Security is just a click away with LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/prevent-identity-disclosure-spiderman/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Single-Tenant vs. Multi-Tenant: Which SaaS Architecture is better for Your Business? ]]></title><description><![CDATA[When choosing a SaaS architecture for your business, the decision between single-tenant and multi-tenant models can significantly impact performance, security, and cost. This blog explores the key differences, advantages, and potential drawbacks of each approach, helping you determine which solution best aligns with your business needs.]]></description><link>https://www.loginradius.com/blog/engineering/saas-single-tenancy-vs-multi-tenancy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/saas-single-tenancy-vs-multi-tenancy/</guid><category><![CDATA[saas]]></category><category><![CDATA[Architecture]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 01 Dec 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56b63a15905e7c7aae59c6304095ee86/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When choosing a SaaS architecture for your business, the decision between single-tenant and multi-tenant models can significantly impact performance, security, and cost. This blog explores the key differences, advantages, and potential drawbacks of each approach, helping you determine which solution best aligns with your business needs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/saas-single-tenancy-vs-multi-tenancy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[10 Tips From CIAM Experts to Reduce the Attack Surface of User Authentication]]></title><description><![CDATA[Companies are predominantly facing the challenge of securing their infrastructures from cyber threats. By analyzing and implementing the security measures mentioned in this blog, you can safeguard your company from cyber threats and help it leverage the benefit of a dispersed workforce.]]></description><link>https://www.loginradius.com/blog/identity/reduce-attack-surface-online-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/reduce-attack-surface-online-business/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[user authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 30 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3c31b53309ab88a14526cbb38c167b73/58556/attack-surface.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Companies are predominantly facing the challenge of securing their infrastructures from cyber threats. By analyzing and implementing the security measures mentioned in this blog, you can safeguard your company from cyber threats and help it leverage the benefit of a dispersed workforce. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/reduce-attack-surface-online-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Sharing My Journey With LoginRadius: A Look Inside the Best Employee Perks]]></title><description><![CDATA[Working at LoginRadius is more than just a job. The organization is an excellent combination of professionalism and fun, where an employee’s association is highly valued, recognized, and respected in every step of their journey.]]></description><link>https://www.loginradius.com/blog/growth/loginradius-employee-perks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/loginradius-employee-perks/</guid><dc:creator><![CDATA[Hitesh Kumawat]]></dc:creator><pubDate>Fri, 26 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/de92c0be7eed752a2fc4d0d78b1b9061/58556/picture04.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Working at LoginRadius is more than just a job. The organization is an excellent combination of professionalism and fun, where an employee’s association is highly valued, recognized, and respected in every step of their journey. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/loginradius-employee-perks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hitesh Kumawat&amp;size=100</authorImage></item><item><title><![CDATA[Why You Should Use Open Source Project For Your Business]]></title><description><![CDATA[As a developer, chances are at some point you’ve looked at an open source project to solve a problem. But before going off and using the first one you come across, it’s important to consider both the pros and cons of using open source.]]></description><link>https://www.loginradius.com/blog/identity/pros-cons-open-source-project/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pros-cons-open-source-project/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Jitender Agarwal]]></dc:creator><pubDate>Fri, 26 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/62cb8a5bb59d49e731be85ba6dfa25f5/58556/open-source.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a developer, chances are at some point you’ve looked at an open source project to solve a problem. But before going off and using the first one you come across, it’s important to consider both the pros and cons of using open source. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pros-cons-open-source-project/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jitender Agarwal&amp;size=100</authorImage></item><item><title><![CDATA[How to Blend Security with Frictionless User Experience]]></title><description><![CDATA[By striking the right balance between UX and security, you can provide a product that consumers trust and enjoy using. If, on the other hand, you compromise one for the other, customer churn is a more likely scenario.]]></description><link>https://www.loginradius.com/blog/growth/4-tips-secure-frictionless-ux/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/4-tips-secure-frictionless-ux/</guid><category><![CDATA[data security]]></category><category><![CDATA[social login]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Shivangini Yadav]]></dc:creator><pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ce99cd3a30a9c69c811c2201cea6397d/58556/ux-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; By striking the right balance between UX and security, you can provide a product that consumers trust and enjoy using. If, on the other hand, you compromise one for the other, customer churn is a more likely scenario. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/4-tips-secure-frictionless-ux/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shivangini Yadav&amp;size=100</authorImage></item><item><title><![CDATA[How LoginRadius Webhook Allows You to Sync Your Data in Real-Time]]></title><description><![CDATA[Businesses can leverage the true potential of Webhook that allows them to build or set up integrations that subscribe to certain events on LoginRadius CIAM. Let’s understand how LoginRadius improves business performance through third-party integrations and helps sync your crucial business data in real-time through Webhook.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-webhook-datasync-realtime/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-webhook-datasync-realtime/</guid><category><![CDATA[webhook]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/102808f1c71034546156ef5980339cdf/58556/webhook-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses can leverage the true potential of Webhook that allows them to build or set up integrations that subscribe to certain events on LoginRadius CIAM. Let’s understand how LoginRadius improves business performance through third-party integrations and helps sync your crucial business data in real-time through Webhook. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-webhook-datasync-realtime/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[17 Tips to Avoid Shopping Scams on Black Friday & Cyber Monday]]></title><description><![CDATA[Many people prefer shopping online these days rather than going to a conventional store. Therefore, securing the data of your customers online is an integral part of protecting the organisation as a whole. Your job is to let them shop with some of the best online shopping tips with confidence.]]></description><link>https://www.loginradius.com/blog/identity/online-shopping-tips/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/online-shopping-tips/</guid><category><![CDATA[data protection]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0118a6026e31019cddc162be44b2261a/176df/17-online-shopping-tips-for-consumer.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Many people prefer shopping online these days rather than going to a conventional store. Therefore, securing the data of your customers online is an integral part of protecting the organisation as a whole. Your job is to let them shop with some of the best online shopping tips with confidence. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/online-shopping-tips/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Build Your First Smart Contract with Ethereum & Solidity]]></title><description><![CDATA[Smart contracts are an exciting way to build decentralized applications (dapps) on a blockchain. This tutorial helps you learn and build your first smart contract using Solidity on Ethereum blockchain.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/ethereum-smart-contract-tutorial/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/ethereum-smart-contract-tutorial/</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[Solidity]]></category><dc:creator><![CDATA[Aritra Belel]]></dc:creator><pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/228990fbfc76ea8c2e7af2b164f89999/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Smart contracts are an exciting way to build decentralized applications (dapps) on a blockchain. This tutorial helps you learn and build your first smart contract using Solidity on Ethereum blockchain. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/ethereum-smart-contract-tutorial/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://github.com/belelaritra.png?size=100v=40</authorImage></item><item><title><![CDATA[What are JWT, JWS, JWE, JWK, and JWA?]]></title><description><![CDATA[Learn about the JOSE framework and its specifications, including JSON Web Token (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web Algorithms (JWA). For easier reference, bookmark this article.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/what-are-jwt-jws-jwe-jwk-jwa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/what-are-jwt-jws-jwe-jwk-jwa/</guid><category><![CDATA[JSON]]></category><category><![CDATA[Encryption]]></category><dc:creator><![CDATA[Yashesvinee V]]></dc:creator><pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7898fa94ca50b14a5edee22b6dd76018/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the JOSE framework and its specifications, including JSON Web Token (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web Algorithms (JWA). For easier reference, bookmark this article. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/what-are-jwt-jws-jwe-jwk-jwa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/Yashesvinee.png?size=100v=40</authorImage></item><item><title><![CDATA[Why CMOs should care about CIAM]]></title><description><![CDATA[CMOs can deliver more efficient, secure, and relevant services and goods if they have a detailed grasp of who their customers are and what they require. Learn how a CIAM solution may be a valuable strategic asset for CMOs to utilize in their department.]]></description><link>https://www.loginradius.com/blog/growth/ciam-opportunity-for-cmos/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-opportunity-for-cmos/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 22 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/39e16b4c918e54c0cdfed2c27921c070/58556/cmo-ciam.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CMOs can deliver more efficient, secure, and relevant services and goods if they have a detailed grasp of who their customers are and what they require. Learn how a CIAM solution may be a valuable strategic asset for CMOs to utilize in their department. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-opportunity-for-cmos/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Federated Identity Management vs. SSO: What's The Difference?]]></title><description><![CDATA[Enterprises need to use methods to maximize the use of digital identities for multiple users. Although SSO and FIM are used together, they do not mean the same thing. The main difference between Identity Federation and SSO lies in the range of access.]]></description><link>https://www.loginradius.com/blog/identity/federated-identity-management-vs-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/federated-identity-management-vs-sso/</guid><category><![CDATA[federated identity management]]></category><category><![CDATA[sso]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 22 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dca3ddb52d40e9e0ae06d9dfce99e984/7f8e9/sso-vs-fim.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Enterprises need to use methods to maximize the use of digital identities for multiple users. Although SSO and FIM are used together, they do not mean the same thing. The main difference between Identity Federation and SSO lies in the range of access. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/federated-identity-management-vs-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Evaluate the Quality of Your User Authentication System]]></title><description><![CDATA[Whether we talk about data leaks or identity thefts, businesses that become victims of security breaches compromise their brand reputation and lose millions of dollars every year. Hence, robust authentication and authorization mechanisms become a necessity and not just a luxury. Let’s understand how businesses can evaluate the quality of a user authentication system.]]></description><link>https://www.loginradius.com/blog/identity/assess-improve-your-authentication-system/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/assess-improve-your-authentication-system/</guid><category><![CDATA[user authentication]]></category><category><![CDATA[authorization]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Arpita Garg]]></dc:creator><pubDate>Thu, 18 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6341aad1bd9149458e8e732349df26ea/7f8e9/user-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether we talk about data leaks or identity thefts, businesses that become victims of security breaches compromise their brand reputation and lose millions of dollars every year. Hence, robust authentication and authorization mechanisms become a necessity and not just a luxury. Let’s understand how businesses can evaluate the quality of a user authentication system. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/assess-improve-your-authentication-system/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Arpita Garg&amp;size=100</authorImage></item><item><title><![CDATA[How CIAM can help in Preventing Abandoned Carts]]></title><description><![CDATA[Shoppers leave their carts behind all the time. When this happens, it usually means that they're abandoning their purchase but also that they're possibly losing interest in your brand altogether. This blog takes a deeper look into how CIAM can stop the issue of abandoned carts.]]></description><link>https://www.loginradius.com/blog/growth/ciam-prevents-abandoned-carts/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-prevents-abandoned-carts/</guid><category><![CDATA[progressive profiling]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Tue, 16 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e85ef6d6ca6aa76dd795e1341b333cef/58556/cart-abandon.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Shoppers leave their carts behind all the time. When this happens, it usually means that they&apos;re abandoning their purchase but also that they&apos;re possibly losing interest in your brand altogether. This blog takes a deeper look into how CIAM can stop the issue of abandoned carts. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-prevents-abandoned-carts/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[How LoginRadius Offers Customer-Centric Capabilities that Drive ROI]]></title><description><![CDATA[For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective data management, among others. Check out our infographic for more ROI-centric details.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-roi-enterprises-infographic/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-roi-enterprises-infographic/</guid><category><![CDATA[data management]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 16 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/021b01b3c7c3bdb21bed14ea13513b7c/58556/roi-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective data management, among others. Check out our infographic for more ROI-centric details. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-roi-enterprises-infographic/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Can Social Login Boost Conversion Rates? 5 Things Marketers Should Know]]></title><description><![CDATA[Using social login to drive sign-ups usually makes sense because it increases user privacy. If users like the site, they're more likely to return, and you're more likely to convert them into paying customers. This blog explains how social login can boost conversion rates.]]></description><link>https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/</guid><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><category><![CDATA[data privacy]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 12 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/316ac9f290dad44263d0056f8e80a6b9/58556/social-login-marketer.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Using social login to drive sign-ups usually makes sense because it increases user privacy. If users like the site, they&apos;re more likely to return, and you&apos;re more likely to convert them into paying customers. This blog explains how social login can boost conversion rates. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Mitigate BGP Attacks and Secure Your User's Data]]></title><description><![CDATA[The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises can drastically reduce the risk by adopting the practices mentioned in the blog.]]></description><link>https://www.loginradius.com/blog/identity/how-to-protect-business-bgp-hijacking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-protect-business-bgp-hijacking/</guid><category><![CDATA[enterprise security]]></category><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 12 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8220c688456ad631244703ae9a6ef340/58556/bgp-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises can drastically reduce the risk by adopting the practices mentioned in the blog. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-protect-business-bgp-hijacking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why You Should Customize Your Marketing Programs Based on Consumer Journey]]></title><description><![CDATA[Personalized consumer experience is becoming the need of the hour. Let’s understand how a personalized consumer journey can help businesses stay ahead of the curve and how a CIAM solution like LoginRadius offers valuable insights for creating personalized user experiences.]]></description><link>https://www.loginradius.com/blog/growth/customize-marketing-programs-on-consumer-journey/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customize-marketing-programs-on-consumer-journey/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 10 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a88956f735416a085d5fe6ac8eea51fe/58556/customer-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Personalized consumer experience is becoming the need of the hour. Let’s understand how a personalized consumer journey can help businesses stay ahead of the curve and how a CIAM solution like LoginRadius offers valuable insights for creating personalized user experiences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customize-marketing-programs-on-consumer-journey/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[3 Best Stages of IT Security for Implementing Gartner's CARTA]]></title><description><![CDATA[CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner to help cybersecurity experts ensure a stringent mechanism to handle vulnerabilities.]]></description><link>https://www.loginradius.com/blog/identity/3-stages-gartner-carta-it-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/3-stages-gartner-carta-it-security/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 10 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d61f7309ee63ba983095bdd0735a4454/58556/carta.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner to help cybersecurity experts ensure a stringent mechanism to handle vulnerabilities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/3-stages-gartner-carta-it-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How to Build an OpenCV Web App with Streamlit]]></title><description><![CDATA[You can now easily publish your OpenCV apps to the web using Streamlit, a Python library. Follow this tutorial to learn the process step by step.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/opencv-web-app-with-streamlit/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/opencv-web-app-with-streamlit/</guid><category><![CDATA[OpenCV]]></category><category><![CDATA[Streamlit]]></category><category><![CDATA[Python]]></category><dc:creator><![CDATA[Dingu Sagar]]></dc:creator><pubDate>Wed, 10 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/818e31111fb212b94c72ff9edb09bd3f/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; You can now easily publish your OpenCV apps to the web using Streamlit, a Python library. Follow this tutorial to learn the process step by step. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/opencv-web-app-with-streamlit/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/dingusagar.png?size=100v=40</authorImage></item><item><title><![CDATA[Can Authentication Convert Sales? 4 Authentication Tools for Every Retailer]]></title><description><![CDATA[Authentication is a serious process that can help you convert sales. In many cases, it determines whether a customer will take the time to complete a purchase. Therefore, it is important for your store to have multiple layers of security throughout the checkout process.]]></description><link>https://www.loginradius.com/blog/growth/authentication-tools-boost-sales/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/authentication-tools-boost-sales/</guid><category><![CDATA[biometric authentication]]></category><category><![CDATA[social login]]></category><category><![CDATA[passwordless authentication]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 08 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e630635589cef055457e160124e6a6d8/58556/auth-tools.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication is a serious process that can help you convert sales. In many cases, it determines whether a customer will take the time to complete a purchase. Therefore, it is important for your store to have multiple layers of security throughout the checkout process. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/authentication-tools-boost-sales/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Choose the Right User Authentication Option for your Product]]></title><description><![CDATA[When choosing the right authentication option for your product, there’s a lot of confusion and misconceptions that may eventually make it difficult to finalize one or even more.]]></description><link>https://www.loginradius.com/blog/identity/authentication-option-for-your-product/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-option-for-your-product/</guid><category><![CDATA[data security]]></category><category><![CDATA[passwordless login]]></category><category><![CDATA[authentication]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 08 Nov 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/772e4733966a05f69479c1b9bce7fd77/58556/user-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When choosing the right authentication option for your product, there’s a lot of confusion and misconceptions that may eventually make it difficult to finalize one or even more. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-option-for-your-product/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[4 Main Features of Enterprise Software]]></title><description><![CDATA[Companies want to stay competitive and so their actions must be cost-efficient, adaptable, and time-saving. Enterprise software ensures the fulfillment of those specific needs by drastically improving the workflow between countless departments that make up corporate systems.]]></description><link>https://www.loginradius.com/blog/growth/4-features-enterprise-software/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/4-features-enterprise-software/</guid><category><![CDATA[enterprise security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[sso]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Shivangini Yadav]]></dc:creator><pubDate>Wed, 27 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b61160bddb30e7c6d069a7448a19d719/58556/enteprise-software.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Companies want to stay competitive and so their actions must be cost-efficient, adaptable, and time-saving. Enterprise software ensures the fulfillment of those specific needs by drastically improving the workflow between countless departments that make up corporate systems. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/4-features-enterprise-software/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shivangini Yadav&amp;size=100</authorImage></item><item><title><![CDATA[An Introduction to Financial-Grade API (FAPI) for Open Banking]]></title><description><![CDATA[With open banking, consumers can leverage bank accounts and data networking across diverse institutions through APIs (application programming interfaces), which has reshaped the entire banking industry. However, when it comes to the overall security mechanism of open banking, FAPI becomes the need of the hour.]]></description><link>https://www.loginradius.com/blog/identity/financial-grade-api-open-banking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/financial-grade-api-open-banking/</guid><category><![CDATA[data security]]></category><category><![CDATA[oauth]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8a50dfb3979467c87e899540bf102593/58556/fapi-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With open banking, consumers can leverage bank accounts and data networking across diverse institutions through APIs (application programming interfaces), which has reshaped the entire banking industry. However, when it comes to the overall security mechanism of open banking, FAPI becomes the need of the hour. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/financial-grade-api-open-banking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What are the Authentication Challenges in the Retail Industry?]]></title><description><![CDATA[Losing business means paying for remediation, business disruption, legal expenses, identity repair, regulatory penalties, and other clean-up costs. Although retail has some distinct differences from other industries regarding identity and authentication, it also faces many challenges.]]></description><link>https://www.loginradius.com/blog/growth/authentication-challenges-retail-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/authentication-challenges-retail-industry/</guid><category><![CDATA[data security]]></category><category><![CDATA[retail authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Tue, 26 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/350305ade766c019aecded8e3eb94e4a/58556/retail-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Losing business means paying for remediation, business disruption, legal expenses, identity repair, regulatory penalties, and other clean-up costs. Although retail has some distinct differences from other industries regarding identity and authentication, it also faces many challenges. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/authentication-challenges-retail-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[Why is PKI The Future of Secure Communications]]></title><description><![CDATA[With PKI, one can ensure that data is adequately encrypted during transit, ensuring only the authorized user can access the data. Let’s understand what PKI is and how it paves the path for secure encryption for businesses.]]></description><link>https://www.loginradius.com/blog/identity/pki-future-secure-communications/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pki-future-secure-communications/</guid><category><![CDATA[single sign-on]]></category><category><![CDATA[sso]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 26 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0b337c309257fcbb6d7601f5431bd2d9/58556/pki-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With PKI, one can ensure that data is adequately encrypted during transit, ensuring only the authorized user can access the data. Let’s understand what PKI is and how it paves the path for secure encryption for businesses. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pki-future-secure-communications/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[32 React Best Practices That Every Programmer Should Follow]]></title><description><![CDATA[Important React best practices every React developer should follow before, during, & after writing the code. To ensure code maintainability, keep these React coding best practices handy.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/react-best-coding-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/react-best-coding-practices/</guid><category><![CDATA[React]]></category><dc:creator><![CDATA[Anjali Rohira]]></dc:creator><pubDate>Tue, 26 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ad3a41474714ff1458856a6c47795b66/58556/Best-Practices.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Important React best practices every React developer should follow before, during, &amp; after writing the code. To ensure code maintainability, keep these React coding best practices handy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/react-best-coding-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/rohiraanjali.png?size=100v=40</authorImage></item><item><title><![CDATA[How B2C Industries are Leveraging CIAM in the Retail Supply Chain Management]]></title><description><![CDATA[Retailers hold access to a comprehensive range of technologies. From today's current options, such as RFID tags, to stimulating creativity, such as self-driving trucks, businesses will largely depend on computers to manage their daily operations. Learn how they are incorporating CIAM in their environment.]]></description><link>https://www.loginradius.com/blog/growth/b2c-enterprises-ciam-retail-supply-chain/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/b2c-enterprises-ciam-retail-supply-chain/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[iot authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 25 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a02d5b7f78b8f93b2283b4f4f26e235e/58556/retail-supply-chain-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Retailers hold access to a comprehensive range of technologies. From today&apos;s current options, such as RFID tags, to stimulating creativity, such as self-driving trucks, businesses will largely depend on computers to manage their daily operations. Learn how they are incorporating CIAM in their environment. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/b2c-enterprises-ciam-retail-supply-chain/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Find the Right SSO Strategy that Fits Your Business]]></title><description><![CDATA[In a competitive business environment, SSO (Single Sign-On) establishes a flawless user experience while providing the highest level of security and efficiency. Enterprises need to put their best foot forward in defining the right SSO strategy that fits right for their organization and helps pave the way for overall success.]]></description><link>https://www.loginradius.com/blog/identity/sso-business-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sso-business-strategy/</guid><category><![CDATA[sso provider]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Mon, 25 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20dd42df94351ea7ee7c09def14beea6/58556/sso-business-strategy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In a competitive business environment, SSO (Single Sign-On) establishes a flawless user experience while providing the highest level of security and efficiency. Enterprises need to put their best foot forward in defining the right SSO strategy that fits right for their organization and helps pave the way for overall success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sso-business-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[How to Build a Progressive Web App (PWA) with React]]></title><description><![CDATA[Follow this article to understand how to develop a simple React PWA. It explains the step-by-step process to help you easily follow along.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/how-to-build-a-progressive-web-app-with-react/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/how-to-build-a-progressive-web-app-with-react/</guid><category><![CDATA[React]]></category><category><![CDATA[PWA]]></category><category><![CDATA[npm]]></category><dc:creator><![CDATA[Abdullah Pathan]]></dc:creator><pubDate>Fri, 22 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a95efcae02df125860df9cb572a3e517/58556/blog-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Follow this article to understand how to develop a simple React PWA. It explains the step-by-step process to help you easily follow along. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/how-to-build-a-progressive-web-app-with-react/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/aonepathan.png?size=100v=40</authorImage></item><item><title><![CDATA[Decoding the Role of Multi-Factor Authentication and IVR in Banking]]></title><description><![CDATA[One of the greatest adoptions in the banking industry is the introduction of multi-factor authentication (MFA) and Interactive Voice Response (IVR) systems. Both of them are considered effective ways that help banks to reduce fraud. This blog explains their individual roles in banking.]]></description><link>https://www.loginradius.com/blog/growth/multi-factor-authentication-ivr-banking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/multi-factor-authentication-ivr-banking/</guid><category><![CDATA[mfa]]></category><category><![CDATA[adaptive mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 21 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6babbd2b0056a043e05c700acfdac138/58556/ivr-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; One of the greatest adoptions in the banking industry is the introduction of multi-factor authentication (MFA) and Interactive Voice Response (IVR) systems. Both of them are considered effective ways that help banks to reduce fraud. This blog explains their individual roles in banking. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/multi-factor-authentication-ivr-banking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Cybersecurity Best Practices for Businesses in 2023 & Beyond [Infographic]]]></title><description><![CDATA[Today cybercriminals are increasingly able to cover their tracks, hide in the cloud, manipulate the infrastructure of the web, and exploit complex vulnerabilities. This infographic summarizes the key takeaway into the cybersecurity best practices that businesses should adopt in 2023.]]></description><link>https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><category><![CDATA[password management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 21 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2054e143ee62c046f4ff0fb6b40d0f23/7f8e9/cybersecurity-best-practices.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today cybercriminals are increasingly able to cover their tracks, hide in the cloud, manipulate the infrastructure of the web, and exploit complex vulnerabilities. This infographic summarizes the key takeaway into the cybersecurity best practices that businesses should adopt in 2023. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Bootstrap 4 vs. Bootstrap 5: What is the Difference?]]></title><description><![CDATA[This article discusses the differences between Bootstrap 4 and Bootstrap 5 and helps you understand which version you should use for your projects.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/bootstrap4-vs-bootstrap5/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/bootstrap4-vs-bootstrap5/</guid><category><![CDATA[Bootstrap]]></category><category><![CDATA[Frontend]]></category><category><![CDATA[Sass]]></category><dc:creator><![CDATA[Rutam Prita Mishra]]></dc:creator><pubDate>Thu, 21 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b8214436ee2553d77f17b33b5fdb3112/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article discusses the differences between Bootstrap 4 and Bootstrap 5 and helps you understand which version you should use for your projects. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/bootstrap4-vs-bootstrap5/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/Rutam21.png?size=100v=40</authorImage></item><item><title><![CDATA[Embracing Risk-Based Authentication in the Gaming Industry]]></title><description><![CDATA[It is not possible to create an application that protects against everything, especially in the gaming industry. Although it is important to effectively protect sensitive data in electronic gaming environments, it is also essential to create systems that maintain the fun and excitement of online gaming. Risk-Based Authentication makes it possible.]]></description><link>https://www.loginradius.com/blog/growth/risk-based-authentication-gaming-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/risk-based-authentication-gaming-industry/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 18 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/781236739131cfaccfcb8a2eaa338ca3/58556/rba-gaming-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is not possible to create an application that protects against everything, especially in the gaming industry. Although it is important to effectively protect sensitive data in electronic gaming environments, it is also essential to create systems that maintain the fun and excitement of online gaming. Risk-Based Authentication makes it possible. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/risk-based-authentication-gaming-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[SSO Integration: How to Secure the Customer Experience on Loyalty Platforms]]></title><description><![CDATA[Today, consumers are enjoying flawless experiences on every platform but can’t indulge in a seamless experience when they connect with a loyalty platform for potential benefits. This post helps you understand the biggest challenge for loyalty platforms and how Single Sign-On (SSO) integration for consumer loyalty platforms solves the purpose.]]></description><link>https://www.loginradius.com/blog/identity/sso-integration-secure-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sso-integration-secure-cx/</guid><category><![CDATA[sso]]></category><category><![CDATA[identity management]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 18 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/50d489f5f51d1a084b2c2dfa86e96533/58556/sso-integration-secure-cx-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, consumers are enjoying flawless experiences on every platform but can’t indulge in a seamless experience when they connect with a loyalty platform for potential benefits. This post helps you understand the biggest challenge for loyalty platforms and how Single Sign-On (SSO) integration for consumer loyalty platforms solves the purpose. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sso-integration-secure-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[JWT Authentication — Best Practices and When to Use]]></title><description><![CDATA[JWT is a common way of implementing authentication in web and mobile apps. Read more to know how you can use JWT and learn the necessary best practices.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/jwt-authentication-best-practices-and-when-to-use/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/jwt-authentication-best-practices-and-when-to-use/</guid><category><![CDATA[JWT]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Kolawole Mangabo]]></dc:creator><pubDate>Thu, 14 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2f8d7e959c4e58511a3d83168d15cd6f/58556/cover-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; JWT is a common way of implementing authentication in web and mobile apps. Read more to know how you can use JWT and learn the necessary best practices. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/jwt-authentication-best-practices-and-when-to-use/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/koladev32.png?size=100v=40</authorImage></item><item><title><![CDATA[10 Ways To Improve Your eCommerce Store's Security]]></title><description><![CDATA[Nobody's perfect, but your eCommerce store can be (to quite an extent). With these ten security measures in place, you'll sleep easier knowing that your business is protected.]]></description><link>https://www.loginradius.com/blog/growth/improve-ecommerce-store-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improve-ecommerce-store-security/</guid><category><![CDATA[retail]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><category><![CDATA[ciam authentication]]></category><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Tue, 12 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2c784f6735cd4401225340b85140deba/58556/improve-ecommerce-store-security-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Nobody&apos;s perfect, but your eCommerce store can be (to quite an extent). With these ten security measures in place, you&apos;ll sleep easier knowing that your business is protected. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improve-ecommerce-store-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[The Top 5 Trends in CIAM We’ve Watched in 2021]]></title><description><![CDATA[The modern CIAM is packed with endless capabilities that ensure robust authentication and eventually help businesses stay ahead of the curve. Here’s the list of CIAM trends that we’ve witnessed in 2021 so far.]]></description><link>https://www.loginradius.com/blog/identity/ciam-trends-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-trends-2021/</guid><category><![CDATA[zero trust]]></category><category><![CDATA[adaptive mfa]]></category><category><![CDATA[passwordless authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 12 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/02a6e9fdf449cd78b82dcfec561359ac/58556/ciam-trends-2021-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The modern CIAM is packed with endless capabilities that ensure robust authentication and eventually help businesses stay ahead of the curve. Here’s the list of CIAM trends that we’ve witnessed in 2021 so far. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-trends-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Major Challenges of Customer Identification in the Retail Industry]]></title><description><![CDATA[Meeting the expectation of consumers these days isn’t a piece of cake for retailers as the modern consumer demands digital experiences at every touchpoint before making a purchase. This insightful read covers all the major challenges that retailers and e-commerce vendors face and how they can overcome them.]]></description><link>https://www.loginradius.com/blog/identity/customer-identification-challenges-retail/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identification-challenges-retail/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[data security]]></category><category><![CDATA[ecommerce]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 07 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e74aafbcfb5ab1a4d7db9cffab40d69f/58556/customer-identification-challenges-retail-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Meeting the expectation of consumers these days isn’t a piece of cake for retailers as the modern consumer demands digital experiences at every touchpoint before making a purchase. This insightful read covers all the major challenges that retailers and e-commerce vendors face and how they can overcome them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identification-challenges-retail/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Cybersecurity Awareness Month: Predicting the Deadliest Cyber Attacks in 2022]]></title><description><![CDATA[Cybersecurity incidents take place by various means every day. From virtual banking breaches to semi-open attacks, 2021 has been rough on IT security. But, how did we get to this point of compromise and uncertainty?]]></description><link>https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 05 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/de2dbddd3461510cd2567eacf183521d/7f8e9/cybersecurity-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybersecurity incidents take place by various means every day. From virtual banking breaches to semi-open attacks, 2021 has been rough on IT security. But, how did we get to this point of compromise and uncertainty? &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Delivers a Seamless User Experience that Increases Conversions through Enhanced Progressive Profiling]]></title><description><![CDATA[Progressive Profiling helps businesses to split a potentially complicated registration process into multiple steps. you can capture business-critical information upfront and then slowly build out a holistic view of your consumers through subsequent actions.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-progressive-profiling/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-progressive-profiling/</guid><category><![CDATA[progressive profiling]]></category><category><![CDATA[user experience]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 05 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fd5bbb7d79a6ac466967d237d8067644/58556/loginradius-progressive-profiling-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Progressive Profiling helps businesses to split a potentially complicated registration process into multiple steps. you can capture business-critical information upfront and then slowly build out a holistic view of your consumers through subsequent actions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-progressive-profiling/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What Are Refresh Tokens? When & How to Use Them]]></title><description><![CDATA[This is your guide to understanding refresh tokens, and why you may need to use them to enhance the user experience of your applications.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/what-are-refresh-tokens-and-when-to-use-them/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/what-are-refresh-tokens-and-when-to-use-them/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Tokens]]></category><category><![CDATA[UX]]></category><dc:creator><![CDATA[Mcvean Soans]]></dc:creator><pubDate>Tue, 05 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/241e64d42dcb94631ac0aa541ff3e5f0/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This is your guide to understanding refresh tokens, and why you may need to use them to enhance the user experience of your applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/what-are-refresh-tokens-and-when-to-use-them/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/McTechie.png?size=100v=40</authorImage></item><item><title><![CDATA[Avoid these Common Mistakes When Dealing with Data Breaches]]></title><description><![CDATA[With hacking events on the rise, it would be wise to take a step back and consider where things went wrong. You can prevent data breach occurrences in your organization by learning to recognize the common mistakes that are committed.]]></description><link>https://www.loginradius.com/blog/identity/data-breaches-common-mistakes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-breaches-common-mistakes/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Fri, 01 Oct 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d1c37012b07566e5c49f717af46f7506/58556/data-breaches-common-mistakes-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With hacking events on the rise, it would be wise to take a step back and consider where things went wrong. You can prevent data breach occurrences in your organization by learning to recognize the common mistakes that are committed. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-breaches-common-mistakes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Participate in Hacktoberfest as a Maintainer]]></title><description><![CDATA[This ultimate guide is the resource you need to open source your project and participate in Hacktoberfest to get valuable contributions from the community.]]></description><link>https://www.loginradius.com/blog/engineering/hacktoberfest-participation-as-maintainer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/hacktoberfest-participation-as-maintainer/</guid><category><![CDATA[Hacktoberfest]]></category><category><![CDATA[Hacktoberfest 2021]]></category><category><![CDATA[Open Source]]></category><dc:creator><![CDATA[Narendra Pareek]]></dc:creator><pubDate>Tue, 28 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ba2c17ed3a96b8c00eacf98433b0338d/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This ultimate guide is the resource you need to open source your project and participate in Hacktoberfest to get valuable contributions from the community. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/hacktoberfest-participation-as-maintainer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/pareek-narendra.png?size=100v=40</authorImage></item><item><title><![CDATA[Tiroler Tageszeitung (TT), a LoginRadius Customer Success Story]]></title><description><![CDATA[Read the success story of how LoginRadius helped Tiroler Tageszeitung increase their user base, provide low downtime, and ensure high scalability, among other diverse challenges.]]></description><link>https://www.loginradius.com/blog/identity/tiroler-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/tiroler-loginradius-customer-success-story/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Tue, 28 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d36a9e39fccb013a271854e8405c3619/58556/tiroler-loginradius-customer-success-story-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Read the success story of how LoginRadius helped Tiroler Tageszeitung increase their user base, provide low downtime, and ensure high scalability, among other diverse challenges. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/tiroler-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[How CISOs Can Improve Collaboration on Security Risks]]></title><description><![CDATA[It no longer makes sense to think of security as a single system, because there are so many different layers, and so many different points of entry. This blog explains how  CISOs can respond to these multivalent threats across an organization.]]></description><link>https://www.loginradius.com/blog/growth/how-ciso-can-improve-collaboration-on-security-risks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-ciso-can-improve-collaboration-on-security-risks/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Shivangini Yadav]]></dc:creator><pubDate>Mon, 27 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/596f9e11d0d91bc782223a31a7906f25/58556/ciso-cover-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It no longer makes sense to think of security as a single system, because there are so many different layers, and so many different points of entry. This blog explains how  CISOs can respond to these multivalent threats across an organization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-ciso-can-improve-collaboration-on-security-risks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shivangini Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Hacktoberfest 2021: Contribute and Win Swag from LoginRadius]]></title><description><![CDATA[At LoginRadius, we're excited to celebrate Hacktoberfest 2021. Contribute to our open source projects and win cool LoginRadius branded swag to show off!]]></description><link>https://www.loginradius.com/blog/engineering/hacktoberfest-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/hacktoberfest-2021/</guid><category><![CDATA[Hacktoberfest]]></category><category><![CDATA[Open Source]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Raghunath Reddy]]></dc:creator><pubDate>Thu, 23 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b37804ed1ec767d9a9d9ed54872f51d5/58556/Hacktoberfest-2021.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; At LoginRadius, we&apos;re excited to celebrate Hacktoberfest 2021. Contribute to our open source projects and win cool LoginRadius branded swag to show off! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/hacktoberfest-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/raghunath-r-a.png?size=100v=40</authorImage></item><item><title><![CDATA[What are Security Keys? What are its Advantages?]]></title><description><![CDATA[When it comes to robust security for a seamless authentication and authorization experience, security keys are considered one of the best ways to prove one’s identity. These security practices add an extra security layer other than passwords and ensure that the right person has access to the right information.]]></description><link>https://www.loginradius.com/blog/identity/what-are-security-keys/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-are-security-keys/</guid><category><![CDATA[security keys]]></category><category><![CDATA[mfa]]></category><category><![CDATA[authentication]]></category><category><![CDATA[authorization]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 23 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0a5506c3f5c7bd37f969049de4e3bf09/58556/what-are-security-keys-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When it comes to robust security for a seamless authentication and authorization experience, security keys are considered one of the best ways to prove one’s identity. These security practices add an extra security layer other than passwords and ensure that the right person has access to the right information. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-are-security-keys/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Everything You Need to Know About OAuth and How it Works]]></title><description><![CDATA[ OAuth is an open standard for authorization. It lets users authorize third-party access to their servers without handing out their username and password. Read this blog to also find about OAuth 2.0 as an authorization framework for delegated access to web APIs.]]></description><link>https://www.loginradius.com/blog/identity/what-is-oauth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-oauth/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Vaibhav Jain]]></dc:creator><pubDate>Thu, 23 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ce46d87b9632362a8cff1b61f90edbd4/58556/what-is-oauth-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  OAuth is an open standard for authorization. It lets users authorize third-party access to their servers without handing out their username and password. Read this blog to also find about OAuth 2.0 as an authorization framework for delegated access to web APIs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-oauth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vaibhav Jain&amp;size=100</authorImage></item><item><title><![CDATA[How to Upgrade Your Vim Skills]]></title><description><![CDATA[Vim is Vi's newest and most common reincarnation, which is supported on every known platform. Go through this tutorial to learn about what Vim is and how to make the most out of it.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/vim-level-up/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/vim-level-up/</guid><category><![CDATA[Vim]]></category><category><![CDATA[Text Editor]]></category><category><![CDATA[UNIX]]></category><dc:creator><![CDATA[Shubhankar Khare]]></dc:creator><pubDate>Thu, 23 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/aa9e337b13aca7c3043c49bba3b61a23/58556/Vim.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Vim is Vi&apos;s newest and most common reincarnation, which is supported on every known platform. Go through this tutorial to learn about what Vim is and how to make the most out of it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/vim-level-up/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/iamshubhankarkhare.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Expert Tips on How to Improve the Customer Experience]]></title><description><![CDATA[If you are interested in the best practices that will come in handy for improving customer experience, read these expert tips and improve client impressions when interacting with them.]]></description><link>https://www.loginradius.com/blog/growth/how-to-improve-the-customer-xperience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-improve-the-customer-xperience/</guid><dc:creator><![CDATA[Alyse Falk]]></dc:creator><pubDate>Wed, 22 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8164e2b7a513dc680d4e4bd521b633c8/d356d/consumer-exp-cover-page.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you are interested in the best practices that will come in handy for improving customer experience, read these expert tips and improve client impressions when interacting with them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-improve-the-customer-xperience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Alyse Falk&amp;size=100</authorImage></item><item><title><![CDATA[Decentralized Authentication: What Is It And How It Is Changing the Industry]]></title><description><![CDATA[Decentralized Authentication is the key to advancing in the future, and now it depends on how you try to implement it. This blog explains what decentralization means for the next wave of business security.]]></description><link>https://www.loginradius.com/blog/identity/what-is-decentralized-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-decentralized-authentication/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 21 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fd59892c4ae5640263f1872cde598199/58556/what-is-decentralized-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Decentralized Authentication is the key to advancing in the future, and now it depends on how you try to implement it. This blog explains what decentralization means for the next wave of business security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-decentralized-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Getting Started with OpenID Connect]]></title><description><![CDATA[This article  discusses the basics of OpenID Connect. Its components, and strengths as well as implementation details you need to know about when using it in a real world scenario.]]></description><link>https://www.loginradius.com/blog/identity/what-is-openid-connect/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-openid-connect/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Gurjyot Singh]]></dc:creator><pubDate>Tue, 21 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6de3dbe4d33771b7a95f8e811abcfedd/58556/what-is-openid-connect-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article  discusses the basics of OpenID Connect. Its components, and strengths as well as implementation details you need to know about when using it in a real world scenario. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-openid-connect/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Gurjyot Singh&amp;size=100</authorImage></item><item><title><![CDATA[5 Key CIAM Benefits and Challenges in the Retail Industry]]></title><description><![CDATA[The modern retail industry has several challenges that can be solved by deploying a CIAM solution. Read this blog to learn how CIAM goes beyond just streamlining a platform to make it more intuitive, and how it boosts the marketing and sales efforts of a business in the retail industry.]]></description><link>https://www.loginradius.com/blog/growth/how-ciam-can-resolve-retail-industry-challenges/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-ciam-can-resolve-retail-industry-challenges/</guid><category><![CDATA[mfa]]></category><category><![CDATA[ciam provider]]></category><category><![CDATA[user experience]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 17 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4431309ee06927722493b5e14f575b84/d356d/retail-industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The modern retail industry has several challenges that can be solved by deploying a CIAM solution. Read this blog to learn how CIAM goes beyond just streamlining a platform to make it more intuitive, and how it boosts the marketing and sales efforts of a business in the retail industry. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-ciam-can-resolve-retail-industry-challenges/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Discover the Benefits of Re-Authentication for Enhanced Security]]></title><description><![CDATA[Re-authentication ensures that hackers don’t get easy access to a system’s content and leverage no other loopholes to exploit sensitive consumer credentials. Apart from internal combustion, re-authentication can also save you from external intrusion.]]></description><link>https://www.loginradius.com/blog/identity/benefits-of-reauthentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/benefits-of-reauthentication/</guid><category><![CDATA[data security]]></category><category><![CDATA[reauthentication]]></category><category><![CDATA[password management]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 16 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c31addfd4517c2802ebde6209b69a793/58556/benefits-of-reauthentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Re-authentication ensures that hackers don’t get easy access to a system’s content and leverage no other loopholes to exploit sensitive consumer credentials. Apart from internal combustion, re-authentication can also save you from external intrusion. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/benefits-of-reauthentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Stand Out from the Crowd: Improve Your Customer Support with CIAM]]></title><description><![CDATA[Whether it’s intuitive and personalized user onboarding or a unified view of every consumer, CIAM is becoming the need of the hour for diverse industries. Let’s learn about the endless possibilities of a CIAM that delivers the highest level of customer support services.]]></description><link>https://www.loginradius.com/blog/identity/ciam-improve-customer-support/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-improve-customer-support/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><category><![CDATA[user management]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Tue, 14 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ac006be34dabb6f8c8c6b2b6b4bbfd48/58556/ciam-improve-customer-support-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether it’s intuitive and personalized user onboarding or a unified view of every consumer, CIAM is becoming the need of the hour for diverse industries. Let’s learn about the endless possibilities of a CIAM that delivers the highest level of customer support services. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-improve-customer-support/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[8 Common Challenges With Your SaaS Business that CIAM Can Solve]]></title><description><![CDATA[To be successful, your SaaS needs to use the right application performance management software. CIAM is the first step you need to take to avoid common challenges like lack of compliance, and incompetent onboarding.]]></description><link>https://www.loginradius.com/blog/growth/ciam-challenges-saas-business-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ciam-challenges-saas-business-app/</guid><category><![CDATA[saas]]></category><category><![CDATA[customer identity management]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Fri, 10 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80fdbdd1899df61abca3c51d9d96c8b8/d356d/saas-buisness.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; To be successful, your SaaS needs to use the right application performance management software. CIAM is the first step you need to take to avoid common challenges like lack of compliance, and incompetent onboarding. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ciam-challenges-saas-business-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[8 Common Challenges With Your SaaS Business that CIAM Can Solve]]></title><description><![CDATA[To be successful, your SaaS needs to use the right application performance management software. CIAM is the first step you need to take to avoid common challenges like lack of compliance, and incompetent onboarding.]]></description><link>https://www.loginradius.com/blog/growth/top-8-ciam-challenges-with-your-saas-business-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-8-ciam-challenges-with-your-saas-business-app/</guid><category><![CDATA[identity management]]></category><category><![CDATA[customer identity]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Fri, 10 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80fdbdd1899df61abca3c51d9d96c8b8/d356d/saas-business-app.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; To be successful, your SaaS needs to use the right application performance management software. CIAM is the first step you need to take to avoid common challenges like lack of compliance, and incompetent onboarding. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-8-ciam-challenges-with-your-saas-business-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[How Good Transaction Security Ensures Smooth Consumer Visits]]></title><description><![CDATA[The sudden increase in the number of transaction-related security breaches is undeniably pointing towards the need for a robust security mechanism that can build consumer trust. This post uncovers the role of secure transactions and how businesses can ensure smooth consumer visits.]]></description><link>https://www.loginradius.com/blog/growth/good-transaction-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/good-transaction-security/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 07 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d913b90f984f05ccee6f7fc9c1ada259/d356d/smooth-transaction-security-with-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The sudden increase in the number of transaction-related security breaches is undeniably pointing towards the need for a robust security mechanism that can build consumer trust. This post uncovers the role of secure transactions and how businesses can ensure smooth consumer visits. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/good-transaction-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Why Should You be Customizing Your Identity System to Your Needs]]></title><description><![CDATA[Customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. Let’s understand this in detail.]]></description><link>https://www.loginradius.com/blog/identity/identity-system-customization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-system-customization/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 07 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7add18e9a6b7f2b381c73647ffb4e7d2/58556/identity-system-customization-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. Let’s understand this in detail. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-system-customization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[How to Implement Role-Based Authentication with React Apps]]></title><description><![CDATA[This tutorial illustrates how to perform user authentication and assign roles to users in React apps using LoginRadius.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/role-based-user-authentication-with-loginradius-and-reactjs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/role-based-user-authentication-with-loginradius-and-reactjs/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[React]]></category><category><![CDATA[User Roles]]></category><dc:creator><![CDATA[Victory Tuduo]]></dc:creator><pubDate>Fri, 03 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f67613d9df4f2b44e8700d779302109e/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This tutorial illustrates how to perform user authentication and assign roles to users in React apps using LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/role-based-user-authentication-with-loginradius-and-reactjs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>17</timeToReadBlog><authorImage>https://github.com/Victory-ET.png?size=100v=40</authorImage></item><item><title><![CDATA[How Does the Future Look Like for the Authentication Services Market?]]></title><description><![CDATA[Authentication services have a lot to offer every sector possible, from healthcare to even defense. It is essentially the future of login security and will play an important role in reducing ransomware attacks.]]></description><link>https://www.loginradius.com/blog/growth/future-of-authentication-service-market/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/future-of-authentication-service-market/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 02 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4ed8366c6f62eb2a44e8ba552a82ad76/d356d/future-of-authentication-market.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication services have a lot to offer every sector possible, from healthcare to even defense. It is essentially the future of login security and will play an important role in reducing ransomware attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/future-of-authentication-service-market/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[SMS Authentication — Can it Really Protect Your Business?]]></title><description><![CDATA[Protecting your business with two-factor/ multi-factor authentication is a great way to keep unauthorized users away from your confidential data. But are SMS secure enough for this purpose? Are there any other security flaws involved in using SMS for authentication? Let’s find out.]]></description><link>https://www.loginradius.com/blog/identity/sms-authentication-protect-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sms-authentication-protect-business/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Ashish Kumar Yadav]]></dc:creator><pubDate>Thu, 02 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eccefc9c9391b2f85a6f087bbca454c5/58556/sms-authentication-protect-business-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Protecting your business with two-factor/ multi-factor authentication is a great way to keep unauthorized users away from your confidential data. But are SMS secure enough for this purpose? Are there any other security flaws involved in using SMS for authentication? Let’s find out. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sms-authentication-protect-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashish Kumar Yadav&amp;size=100</authorImage></item><item><title><![CDATA[How MFA Makes Quick Service Restaurants (QSR) Promotion Fraud-Free]]></title><description><![CDATA[Quick-Service Restaurants are seeing a boom in engagement, but so are the scammers. Read this blog to find out how to boost your restaurant’s confidence in its capacity to defend itself from hackers.]]></description><link>https://www.loginradius.com/blog/growth/how-mfa-makes-qsr-promotions-fraud-free/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-mfa-makes-qsr-promotions-fraud-free/</guid><category><![CDATA[mfa]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[biometric authentication]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 01 Sep 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/53bc9caec638a557b09614ba31a0d367/d356d/qsr-payment-ciam-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Quick-Service Restaurants are seeing a boom in engagement, but so are the scammers. Read this blog to find out how to boost your restaurant’s confidence in its capacity to defend itself from hackers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-mfa-makes-qsr-promotions-fraud-free/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How Consumer Identity Influence Brand Recognizability]]></title><description><![CDATA[People are more likely to pay attention to your offer if they recognize your brand among hundreds of others and consider it trustworthy.]]></description><link>https://www.loginradius.com/blog/growth/how-consumer-identity-influence-brand-recognizability/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-consumer-identity-influence-brand-recognizability/</guid><dc:creator><![CDATA[Conrad Sturdy]]></dc:creator><pubDate>Tue, 31 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1cdfd1403ed46eeb2ef99b323a0c22c8/d356d/brand-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; People are more likely to pay attention to your offer if they recognize your brand among hundreds of others and consider it trustworthy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-consumer-identity-influence-brand-recognizability/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Conrad Sturdy&amp;size=100</authorImage></item><item><title><![CDATA[How Poor Login Concurrency can Impact OTT Platforms' Business]]></title><description><![CDATA[With the increase in subscriptions and the number of audiences online, several underlying threats have severely impacted the OTT businesses. One such issue is poor login concurrency. Learn how login concurrency is affecting OTT platforms and how they can overcome this dilemma.]]></description><link>https://www.loginradius.com/blog/identity/poor-login-concurrency-impact-ott-platforms/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/poor-login-concurrency-impact-ott-platforms/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[broken authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 31 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/effcf09a497a21741a2ed52693b8d5f2/58556/poor-login-concurrency-impact-ott-platforms-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the increase in subscriptions and the number of audiences online, several underlying threats have severely impacted the OTT businesses. One such issue is poor login concurrency. Learn how login concurrency is affecting OTT platforms and how they can overcome this dilemma. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/poor-login-concurrency-impact-ott-platforms/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The ABCs of a Successful Saas Onboarding Process]]></title><description><![CDATA[The onboarding process is the lifeline for your customer, and it's one of the most valuable tools that you as a company can control. Here are a few tips for a stellar SaaS company onboarding process that will greatly improve your customer retention and overall satisfaction.]]></description><link>https://www.loginradius.com/blog/growth/successful-saas-onboarding-process/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/successful-saas-onboarding-process/</guid><category><![CDATA[user onboarding]]></category><category><![CDATA[saas]]></category><category><![CDATA[login authentication]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 27 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/df1ccc00fa68e21f75cba4793032726b/d356d/user-onboarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The onboarding process is the lifeline for your customer, and it&apos;s one of the most valuable tools that you as a company can control. Here are a few tips for a stellar SaaS company onboarding process that will greatly improve your customer retention and overall satisfaction. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/successful-saas-onboarding-process/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[A Comprehensive Guide to Privileged Access Management (PAM)]]></title><description><![CDATA[Privileged access management—finding the right balance between security and convenience. This blog explains why PAM matters, highlights its key features and strategies that the organization should use to ensure the proper implementation of PAM.]]></description><link>https://www.loginradius.com/blog/identity/what-is-privileged-access-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-privileged-access-management/</guid><category><![CDATA[data security]]></category><category><![CDATA[Privileged Access Management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Bhavya Tugnawat]]></dc:creator><pubDate>Thu, 26 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1df0e93c0ed38113105f1e6b535bab65/58556/what-is-privileged-access-management-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Privileged access management—finding the right balance between security and convenience. This blog explains why PAM matters, highlights its key features and strategies that the organization should use to ensure the proper implementation of PAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-privileged-access-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Bhavya Tugnawat&amp;size=100</authorImage></item><item><title><![CDATA[How to Authenticate Users: JWT vs. Session]]></title><description><![CDATA[In this article, you'll learn the differences between JWT and Sessions, and which one to use for authentication.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/jwt-vs-sessions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/jwt-vs-sessions/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[JWT]]></category><category><![CDATA[Sessions]]></category><dc:creator><![CDATA[Uma Victor]]></dc:creator><pubDate>Thu, 26 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b6b3c675a1895002bda9c771b6829e2/58556/ArticleHead.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, you&apos;ll learn the differences between JWT and Sessions, and which one to use for authentication. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/jwt-vs-sessions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/uma-victor1.png?size=100v=40</authorImage></item><item><title><![CDATA[How Cities Can Improve Civilians’ Digital Experience with Unified Identity]]></title><description><![CDATA[Civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. This post highlights the role of digital identities in supporting the idea of smart cities.]]></description><link>https://www.loginradius.com/blog/identity/smart-cities-improve-unified-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/smart-cities-improve-unified-identity/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 25 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/acf990e9e300da6a6ecdc4f5038f3dc6/58556/smart-cities-improve-unified-identity-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. This post highlights the role of digital identities in supporting the idea of smart cities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/smart-cities-improve-unified-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Refresh Tokens: When to Use Them and How They Interact with JWTs]]></title><description><![CDATA[A token plays a crucial role in enhancing the overall security mechanism of an organization. This blog provides an overview of using refresh tokens and how it helps securely authenticate users without hampering their overall experience.]]></description><link>https://www.loginradius.com/blog/identity/refresh-tokens-jwt-interaction/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/refresh-tokens-jwt-interaction/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Saikiran Babladi]]></dc:creator><pubDate>Tue, 24 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/03009d06593d5711c4a62d34609c9dee/58556/refresh-tokens-jwt-interaction-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A token plays a crucial role in enhancing the overall security mechanism of an organization. This blog provides an overview of using refresh tokens and how it helps securely authenticate users without hampering their overall experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/refresh-tokens-jwt-interaction/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Saikiran Babladi&amp;size=100</authorImage></item><item><title><![CDATA[A Glimpse of LoginRadius' CSR Activities: How Do We Foster a Culture of Care]]></title><description><![CDATA[LoginRadius has been carrying out CSR activities since its inception and has been focused on giving back in any way possible to society. Learn how the company fosters a CSR culture within its organization.]]></description><link>https://www.loginradius.com/blog/growth/loginradius-csr-activities/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/loginradius-csr-activities/</guid><dc:creator><![CDATA[Naveen Soni]]></dc:creator><pubDate>Thu, 19 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee277efdc37beef8c4925ce8682fbe56/58556/loginradius-csr-activities-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius has been carrying out CSR activities since its inception and has been focused on giving back in any way possible to society. Learn how the company fosters a CSR culture within its organization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/loginradius-csr-activities/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Naveen Soni&amp;size=100</authorImage></item><item><title><![CDATA[10 Tips to Ensure Your Wi-Fi is Private and Blocking Hackers]]></title><description><![CDATA[This particular article will discuss some tips to reduce the likelihood of hackers stealing your personal data when you connect to Wi-Fi.]]></description><link>https://www.loginradius.com/blog/growth/secure-your-wi-fi-against-hackers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/secure-your-wi-fi-against-hackers/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Thu, 19 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f59359a16bd230621fd48561f78a7813/d356d/secure-wi-fi-against-hackers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This particular article will discuss some tips to reduce the likelihood of hackers stealing your personal data when you connect to Wi-Fi. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/secure-your-wi-fi-against-hackers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[How Progressive Disclosure Makes Your User's Onboarding Easy]]></title><description><![CDATA[Progressive disclosure helps businesses portray essential information initially and then gradually uncover the rest of the features that ensure users aren’t overburdened and that their purpose is solved. This post helps businesses understand the importance of progressive disclosure and progressive profiling that work harmoniously to enhance conversions.]]></description><link>https://www.loginradius.com/blog/identity/progressive-disclosure-user-onboarding/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/progressive-disclosure-user-onboarding/</guid><category><![CDATA[user onboarding]]></category><category><![CDATA[data security]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 18 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/38b6c0ca2d998c1ccbef0feb6996138b/58556/progressive-disclosure-user-onboarding-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Progressive disclosure helps businesses portray essential information initially and then gradually uncover the rest of the features that ensure users aren’t overburdened and that their purpose is solved. This post helps businesses understand the importance of progressive disclosure and progressive profiling that work harmoniously to enhance conversions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/progressive-disclosure-user-onboarding/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Why Should You Implement Social Login Authentication?]]></title><description><![CDATA[If you're building a startup today, social login should be the default, not an afterthought. It will give you a huge competitive advantage, because your users won't have to register or even create an email address to use your site.]]></description><link>https://www.loginradius.com/blog/growth/why-should-implement-social-login-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/why-should-implement-social-login-authentication/</guid><category><![CDATA[social login authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 16 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b8ec734d40cb9722076b14d2027bf1bd/d356d/social-login-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you&apos;re building a startup today, social login should be the default, not an afterthought. It will give you a huge competitive advantage, because your users won&apos;t have to register or even create an email address to use your site. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/why-should-implement-social-login-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What is Digital Identity Verification and Why is it Necessary?]]></title><description><![CDATA[Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. This post helps better understand what digital identity verification is, how it works, and the types of digital identity verification systems.]]></description><link>https://www.loginradius.com/blog/identity/what-is-identity-verification/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-identity-verification/</guid><category><![CDATA[identity verification]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Fri, 13 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fabc1da4c101c2912487781c0af671bc/58556/what-is-identity-verification-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. This post helps better understand what digital identity verification is, how it works, and the types of digital identity verification systems. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-identity-verification/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[9 Facts About Social Login & CRO That You Should Know About]]></title><description><![CDATA[Naturally, a marketing team should strive to create a user experience that will lead to more conversions. And, fortunately, social login makes this highly achievable. It allows users to easily sign on to your website with social media profiles, and also allows the consumer to customize their preferences based on their previous activity and interaction with the brand.]]></description><link>https://www.loginradius.com/blog/growth/9-facts-about-social-login-and-cro/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/9-facts-about-social-login-and-cro/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Thu, 12 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dd8131133b6ffe75dd02bb806d3d18e6/58556/conversion-rate-optimization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Naturally, a marketing team should strive to create a user experience that will lead to more conversions. And, fortunately, social login makes this highly achievable. It allows users to easily sign on to your website with social media profiles, and also allows the consumer to customize their preferences based on their previous activity and interaction with the brand. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/9-facts-about-social-login-and-cro/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[How OTT Services can Simplify Authentication on Various Devices]]></title><description><![CDATA[In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for safeguarding consumer identities on different devices for OTT platforms.]]></description><link>https://www.loginradius.com/blog/identity/ott-simplify-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ott-simplify-authentication/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[progressive profiling]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Tue, 10 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a6980666605631a7fae416273e58edfd/58556/ott-simplify-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for safeguarding consumer identities on different devices for OTT platforms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ott-simplify-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[Enhance Your Consumer Experience in Insurance Companies With CIAM]]></title><description><![CDATA[Unaided consumer interactions are a lost opportunity. The main goal of an insurance company should be to reduce the time taken in all their consumer interactions and increase the consumer experience level. This can only happen by implementing excellent systems and processes, which is where a CIAM comes into play.]]></description><link>https://www.loginradius.com/blog/growth/enhance-customer-experience-in-insurance-companies-with-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/enhance-customer-experience-in-insurance-companies-with-ciam/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[passwordless authentication]]></category><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/466804b54dfb16cd18ce90fb5f6edcea/8829b/couple-meeting-with-insurance-agent.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unaided consumer interactions are a lost opportunity. The main goal of an insurance company should be to reduce the time taken in all their consumer interactions and increase the consumer experience level. This can only happen by implementing excellent systems and processes, which is where a CIAM comes into play. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/enhance-customer-experience-in-insurance-companies-with-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Use Azure Key Vault With an Azure Web App in C#]]></title><description><![CDATA[In this tutorial, you'll learn how to work with Azure Key Vault in C#.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/using-azure-key-vault-with-an-azure-web-app-in-c-sharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/using-azure-key-vault-with-an-azure-web-app-in-c-sharp/</guid><category><![CDATA[Azure]]></category><category><![CDATA[Key Vault]]></category><category><![CDATA[C#]]></category><dc:creator><![CDATA[Joydip Kanjilal]]></dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5805f256d7d45f4c053d796f640836c2/58556/image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, you&apos;ll learn how to work with Azure Key Vault in C#. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/using-azure-key-vault-with-an-azure-web-app-in-c-sharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/joydipkanjilal.png?size=100v=40</authorImage></item><item><title><![CDATA[A Beginner's Guide to Zero Trust Security Model]]></title><description><![CDATA[With the rising number of cyberattacks, there’s an immediate need for a robust mechanism that provides a risk-free digital ecosystem. Zero trust helps businesses create the most secure environment that mitigates the risk of any kind of security breach.]]></description><link>https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/</guid><category><![CDATA[zero trust security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 05 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/61286322d61380386bdb27d250ddfce2/58556/beginners-guide-zero-trust-security-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the rising number of cyberattacks, there’s an immediate need for a robust mechanism that provides a risk-free digital ecosystem. Zero trust helps businesses create the most secure environment that mitigates the risk of any kind of security breach. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Best Practices for Securing Your Remote Workforce with Identity Management]]></title><description><![CDATA[Learn about the best practices to ensure cybersecurity for remote workers using identity management]]></description><link>https://www.loginradius.com/blog/growth/secure-your-remote-workforce-with-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/secure-your-remote-workforce-with-identity-management/</guid><category><![CDATA[zero trust security]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 04 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9609127fc31092a204610bed9fc2482b/58556/remote-workforce.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the best practices to ensure cybersecurity for remote workers using identity management &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/secure-your-remote-workforce-with-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is Identity Security?]]></title><description><![CDATA[Thousands of individuals compromise their identities every day because of weak defense and poor authentication at the service providers’ end. Businesses need a robust identity management solution to navigate their digital transformation journey without compromising user identities and sensitive business information.]]></description><link>https://www.loginradius.com/blog/identity/what-is-identity-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-identity-security/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 03 Aug 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7434871743be3608aa991dcac2d29fd4/58556/purpose-identity-security-2021-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Thousands of individuals compromise their identities every day because of weak defense and poor authentication at the service providers’ end. Businesses need a robust identity management solution to navigate their digital transformation journey without compromising user identities and sensitive business information. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-identity-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Personalize Your Marketing With The Help Of A CIAM Platform]]></title><description><![CDATA[Personalized marketing is a promotional strategy tailored to the individual at the precise moment they require it, and there's no other communication like it. The question is, how will you fulfill that promise? You may utilize tools to acquire and aggregate information about your clients' preferences. Read on to find out what these tools are and how they benefit your business.]]></description><link>https://www.loginradius.com/blog/growth/how-to-make-personalized-marketing-effective-with-consumer-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-make-personalized-marketing-effective-with-consumer-identity/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 30 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e20dd13fd0ffbc5d27f423e6595105cd/58556/personalized-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Personalized marketing is a promotional strategy tailored to the individual at the precise moment they require it, and there&apos;s no other communication like it. The question is, how will you fulfill that promise? You may utilize tools to acquire and aggregate information about your clients&apos; preferences. Read on to find out what these tools are and how they benefit your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-make-personalized-marketing-effective-with-consumer-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Implement Registration and Authentication in Django?]]></title><description><![CDATA[In this tutorial, you will learn how to implement user registration and authentication in Django using LoginRadius.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/implementing-registration-and-authentication-in-django-using-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/implementing-registration-and-authentication-in-django-using-loginradius/</guid><category><![CDATA[Django]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[User Registration]]></category><dc:creator><![CDATA[Taminoturoko Briggs]]></dc:creator><pubDate>Fri, 30 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/daa847118d28c3abd060b8eb7a833f23/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, you will learn how to implement user registration and authentication in Django using LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/implementing-registration-and-authentication-in-django-using-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>12</timeToReadBlog><authorImage>https://github.com/tammibriggs.png?size=100v=40</authorImage></item><item><title><![CDATA[What is a Token? What are its Pros and Cons?]]></title><description><![CDATA[Tokens are widely used to provide authorization and authentication to users when they access a website or a mobile application. This post covers detailed information about the use of tokens along with its advantages and disadvantages.]]></description><link>https://www.loginradius.com/blog/identity/pros-cons-token-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pros-cons-token-authentication/</guid><category><![CDATA[token authentication]]></category><category><![CDATA[authorization]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 29 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/308758e0549fa18cda8a32ff5832f114/58556/pros-cons-token-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Tokens are widely used to provide authorization and authentication to users when they access a website or a mobile application. This post covers detailed information about the use of tokens along with its advantages and disadvantages. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pros-cons-token-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Scale Your Business Quickly with Identity Management]]></title><description><![CDATA[Identity management is much more than just a security mechanism for securing consumer data and sensitive business information; it helps businesses accelerate growth. Learn how a CIAM solution can help businesses securely manage consumer identities and build trust that fosters growth.]]></description><link>https://www.loginradius.com/blog/identity/scale-business-with-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/scale-business-with-identity-management/</guid><category><![CDATA[identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[customer identity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 29 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5897415f6cef01d7b1041ba6b9d4e56a/58556/scale-business-with-identity-management-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity management is much more than just a security mechanism for securing consumer data and sensitive business information; it helps businesses accelerate growth. Learn how a CIAM solution can help businesses securely manage consumer identities and build trust that fosters growth. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/scale-business-with-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Manage Situation After a Data Breach]]></title><description><![CDATA[Data breaches are becoming the new normal and enterprises aren’t aware of the necessary steps that should be taken immediately after a breach. This post offers valuable insights that help organizations to quickly and effectively manage a situation after a data breach is detected.]]></description><link>https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 27 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a69864ba9c5a81575306aa05a80304b4/58556/5-ways-to-handle-a-data-breach-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Data breaches are becoming the new normal and enterprises aren’t aware of the necessary steps that should be taken immediately after a breach. This post offers valuable insights that help organizations to quickly and effectively manage a situation after a data breach is detected. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[11 Tips for Managing Remote Software Engineering Teams]]></title><description><![CDATA[This article will give you 11 tips for managing remote software engineering teams, so you can adjust and improve your hiring, communication, and your team's collective output.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/tips-for-managing-remote-software-engineering-teams/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/tips-for-managing-remote-software-engineering-teams/</guid><category><![CDATA[Remote Work]]></category><category><![CDATA[Developer]]></category><category><![CDATA[Software Engineering]]></category><dc:creator><![CDATA[Erkki Muuga]]></dc:creator><pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/893230b3bae69ab7ab6759eced0fd6c1/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article will give you 11 tips for managing remote software engineering teams, so you can adjust and improve your hiring, communication, and your team&apos;s collective output. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/tips-for-managing-remote-software-engineering-teams/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Erkki Muuga&amp;size=100</authorImage></item><item><title><![CDATA[Using LR Digital Identity to Build the Public Sector of the Future]]></title><description><![CDATA[Identity authentication and management play a key role in navigating the digital world that not only reinforces the public sector and government bodies and helps deliver a flawless user experience in diverse verticals. Let’s learn the importance of identity management and how LoginRadius identity management can help public sectors deliver a flawless and secure user experience.]]></description><link>https://www.loginradius.com/blog/growth/loginradius-digital-identity-to-build-the-public-sector-of-the-future/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/loginradius-digital-identity-to-build-the-public-sector-of-the-future/</guid><category><![CDATA[user management]]></category><category><![CDATA[single sign on]]></category><category><![CDATA[compliance]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Fri, 23 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5dedd1c18859a5c5f6170f95ed288f02/df36c/ciam-role-in-public-sector.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity authentication and management play a key role in navigating the digital world that not only reinforces the public sector and government bodies and helps deliver a flawless user experience in diverse verticals. Let’s learn the importance of identity management and how LoginRadius identity management can help public sectors deliver a flawless and secure user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/loginradius-digital-identity-to-build-the-public-sector-of-the-future/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Strike the Right Balance Between Security and Consumer Experience]]></title><description><![CDATA[Delivering a perfect harmony of a great user experience along with the highest level of security is crucial today. Let’s learn why a great user experience shouldn’t be compromised for security and how LoginRadius helps enterprises create great personalized user experiences reinforced by strict security.]]></description><link>https://www.loginradius.com/blog/identity/balancing-security-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/balancing-security-cx/</guid><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 22 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f01e8f0ad9d38fd819209c6febb55c34/58556/balancing-security-cx-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Delivering a perfect harmony of a great user experience along with the highest level of security is crucial today. Let’s learn why a great user experience shouldn’t be compromised for security and how LoginRadius helps enterprises create great personalized user experiences reinforced by strict security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/balancing-security-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How NIST is Changing Password Creation in 2021]]></title><description><![CDATA[The National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities. Let’s have a quick look at some of the important NIST password guidelines and learn how businesses can ensure maximum security in 2021 and beyond.]]></description><link>https://www.loginradius.com/blog/identity/nist-password-guidelines-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/nist-password-guidelines-2021/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Thu, 22 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2814d8907d87c607b53a10e29acef63b/58556/nist-password-guidelines-2021-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities. Let’s have a quick look at some of the important NIST password guidelines and learn how businesses can ensure maximum security in 2021 and beyond. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/nist-password-guidelines-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[COVID-19 and Beyond: 5 Risk Management Essentials for Your Enterprise]]></title><description><![CDATA[Cybercriminals continuously exploit consumer data and have accelerated outbreaks by taking advantage of the chaotic time, and the weaker first line of defense as businesses adopt new working ecosystems. This post covers all the aspects that require immediate consideration to minimize the risk of identity theft or a security breach.]]></description><link>https://www.loginradius.com/blog/identity/risk-management-essentials-enterprise/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/risk-management-essentials-enterprise/</guid><category><![CDATA[risk management]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[password management]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 20 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fcf2926caac8812410816eca189741aa/58556/risk-management-essentials-enterprise-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybercriminals continuously exploit consumer data and have accelerated outbreaks by taking advantage of the chaotic time, and the weaker first line of defense as businesses adopt new working ecosystems. This post covers all the aspects that require immediate consideration to minimize the risk of identity theft or a security breach. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/risk-management-essentials-enterprise/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How WebAuth Secures Your Users’ Login]]></title><description><![CDATA[WebAuthn is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance. In this post, we’ve highlighted the role of WebAuthn and how it helps to create a secure login experience for consumers.]]></description><link>https://www.loginradius.com/blog/identity/webauth-secures-user-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/webauth-secures-user-login/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 20 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0df4fb4774d60c2a75c0bf7a37f97ba8/58556/webauth-secures-user-login-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; WebAuthn is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance. In this post, we’ve highlighted the role of WebAuthn and how it helps to create a secure login experience for consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/webauth-secures-user-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Role of Consumer Identity Authentication in Digital Banking]]></title><description><![CDATA[Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information.]]></description><link>https://www.loginradius.com/blog/growth/consumer-identity-role-in-the-digital-banking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-identity-role-in-the-digital-banking/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 19 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/85268c047696dc3236d83acb30661eb6/58556/Digital-banking-platform-making-opt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-identity-role-in-the-digital-banking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[One Vision, Many Paths: How We’re Supporting freeCodeCamp]]></title><description><![CDATA[LoginRadius now supports the freeCodeCamp community through a sponsorship program. We also offer $200 credits to freeCodeCamp developers to help them rapidly implement world-class customer identity and access management in their applications.]]></description><link>https://www.loginradius.com/blog/engineering/loginradius-sponsorship-freecodecamp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/loginradius-sponsorship-freecodecamp/</guid><category><![CDATA[LoginRadius]]></category><category><![CDATA[sponsorship]]></category><category><![CDATA[freeCodeCamp]]></category><dc:creator><![CDATA[Raghunath Reddy]]></dc:creator><pubDate>Fri, 16 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e2d9670f74a3203d6424fc773fbaf35b/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius now supports the freeCodeCamp community through a sponsorship program. We also offer $200 credits to freeCodeCamp developers to help them rapidly implement world-class customer identity and access management in their applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/loginradius-sponsorship-freecodecamp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/raghunath-r-a.png?size=100v=40</authorImage></item><item><title><![CDATA[C# Init-Only Setters Property]]></title><description><![CDATA[In this article, we will talk about Init-Only Setters Property in C#.]]></description><link>https://www.loginradius.com/blog/engineering/csharp-init-only-setters-property/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/csharp-init-only-setters-property/</guid><category><![CDATA[C#]]></category><category><![CDATA[Properties]]></category><category><![CDATA[Init]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Thu, 15 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/879023ad1196d757394d7314a2cb202d/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, we will talk about Init-Only Setters Property in C#. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/csharp-init-only-setters-property/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[Adaptive Authentication- Is it the Next Breakthrough in Customer Authentication?]]></title><description><![CDATA[Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data. Here’s a quick read depicting the role and need for adaptive authentication instead of just multi-factor authentication.]]></description><link>https://www.loginradius.com/blog/identity/adaptive-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/adaptive-authentication/</guid><category><![CDATA[adaptive authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 15 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0ad652787a6d7a6ee03e5743c0e4fe77/58556/adaptive-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data. Here’s a quick read depicting the role and need for adaptive authentication instead of just multi-factor authentication. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/adaptive-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Content Security Policy (CSP)]]></title><link>https://www.loginradius.com/blog/engineering/content-security-policy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/content-security-policy/</guid><category><![CDATA[Secuirty Header]]></category><category><![CDATA[CSP]]></category><category><![CDATA[Content Security Policy]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Wed, 14 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a14192a5c3e4cefed740fa3fc0e561e9/58556/content-security-policy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is a Content Security Policy (CSP), and why is it important? Overview A Content Protection Policy (CSP) is a security standard that adds an extra layer of defense in detecting and mitigating certain kinds of attacks, such as Cross-Site Scripting (XSS), clickjacking, and… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/content-security-policy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[From Sign-Up to Purchase – How LoginRadius Offers a Frictionless Consumer Journey]]></title><description><![CDATA[ Enterprises, today, must be aware of the fact that the secret to success lies in quickly identifying and eliminating any pain point that occurs when consumers interact with their brand. Here’s an insightful read depicting how LoginRadius helps enterprises navigate their business success through a frictionless consumer journey.]]></description><link>https://www.loginradius.com/blog/growth/consumer-journey-from-sign-up-to-purchase/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-journey-from-sign-up-to-purchase/</guid><category><![CDATA[user onboarding]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 14 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/058ef4dd54a60e687d13641fa9c43408/58556/consumer-signup-to-purchase.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Enterprises, today, must be aware of the fact that the secret to success lies in quickly identifying and eliminating any pain point that occurs when consumers interact with their brand. Here’s an insightful read depicting how LoginRadius helps enterprises navigate their business success through a frictionless consumer journey. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-journey-from-sign-up-to-purchase/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How Customer Identity Solution Drives Digital eCommerce Success]]></title><description><![CDATA[Learn how a CIAM solution paves the path for an eCommerce business success and why enterprises thinking to step into the eCommerce world should leverage a cutting-edge CIAM solution.]]></description><link>https://www.loginradius.com/blog/growth/customer-identity-drives-digital-ecommerce-success/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-identity-drives-digital-ecommerce-success/</guid><category><![CDATA[identity management]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Sat, 10 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7fb4ef6c17be305baaec509280ac9072/58556/ecommerce-digital-identity-solutions.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how a CIAM solution paves the path for an eCommerce business success and why enterprises thinking to step into the eCommerce world should leverage a cutting-edge CIAM solution. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-identity-drives-digital-ecommerce-success/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[The Rise of BYOI (Bring your own Identity)]]></title><description><![CDATA[The idea of bringing one's own identity has caught the imagination of every digital consumer. By allowing your consumers to log in with an existing set of credentials, you make it easy for them to sign up for an account with you—increasing your overall conversion rate.]]></description><link>https://www.loginradius.com/blog/identity/bring-your-own-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/bring-your-own-identity/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Saikiran Babladi]]></dc:creator><pubDate>Fri, 09 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b265c3527798cce6f9c608118d9c435e/58556/bring-your-own-identity-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The idea of bringing one&apos;s own identity has caught the imagination of every digital consumer. By allowing your consumers to log in with an existing set of credentials, you make it easy for them to sign up for an account with you—increasing your overall conversion rate. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/bring-your-own-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Saikiran Babladi&amp;size=100</authorImage></item><item><title><![CDATA[Understanding PII Compliance: A Key to Enterprise Data Security]]></title><description><![CDATA[The security of personal identity and other details is at increasing risk today, with hackers finding new ways to hack into websites. Therefore, enterprises of all sizes must maintain PII compliance to protect the information of the company and its users.]]></description><link>https://www.loginradius.com/blog/identity/pii-compliance-enterprise/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/pii-compliance-enterprise/</guid><category><![CDATA[data security]]></category><category><![CDATA[enterprise security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 07 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1e7c50faa060dbd2b27e2e85221eb577/58556/pii-compliance-enterprise-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The security of personal identity and other details is at increasing risk today, with hackers finding new ways to hack into websites. Therefore, enterprises of all sizes must maintain PII compliance to protect the information of the company and its users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/pii-compliance-enterprise/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Implementing User Authentication in a Python Application]]></title><description><![CDATA[Learn about user authentication, user identity management, and implementing it correctly into a Python application using LoginRadius.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/user-authentication-in-python/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/user-authentication-in-python/</guid><category><![CDATA[Python]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Flask]]></category><dc:creator><![CDATA[Solomon Esenyi]]></dc:creator><pubDate>Wed, 07 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2005b7a832c4ee0e2301194e9f8eb64b/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about user authentication, user identity management, and implementing it correctly into a Python application using LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/user-authentication-in-python/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/LordGhostX.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 3 CIAM Indicators That You’ll Get the Consumer Satisfaction You Deserve]]></title><description><![CDATA[CIAM offers the luxury of a centralized database to provide a secure and seamless consumer experience. In this post, we’ve discussed the CIAM indicators that ensure you’re getting adequate ROI and eventually safeguarding consumer satisfaction.]]></description><link>https://www.loginradius.com/blog/growth/top-3-ciam-indicators/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-3-ciam-indicators/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 06 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b0b591b2e918d37f8961e4d760e64a6b/58556/ciam-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; CIAM offers the luxury of a centralized database to provide a secure and seamless consumer experience. In this post, we’ve discussed the CIAM indicators that ensure you’re getting adequate ROI and eventually safeguarding consumer satisfaction. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-3-ciam-indicators/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Introducing LoginRadius CLI]]></title><description><![CDATA[LoginRadius CLI helps you to perform basic actions of your LoginRadius Dashboard through the command line. The actions include login, register, logout, email configuration, domain whitelisting, etc.]]></description><link>https://www.loginradius.com/blog/engineering/introducing-loginradius-cli/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introducing-loginradius-cli/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[DevTools]]></category><category><![CDATA[CLI]]></category><category><![CDATA[LoginRadius CLI]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Fri, 02 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c6be7e8c6ad8c169f91db6ca132b0667/a3e81/cli.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius CLI helps you to perform basic actions of your LoginRadius Dashboard through the command line. The actions include login, register, logout, email configuration, domain whitelisting, etc. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introducing-loginradius-cli/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Make Your Automated Emails Sound Personal, Relevant, and Effective?]]></title><description><![CDATA[ The chances are that as a marketer, you’re already segmenting your audience and sending them targeted emails. But is that enough? Making your emails relevant is one thing, and making them interesting and engaging is something completely different. If implemented correctly, personalization is a powerful tool that can help you engage your audience and nurture your leads.]]></description><link>https://www.loginradius.com/blog/growth/how-to-leverage-email-automation-personalization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-leverage-email-automation-personalization/</guid><category><![CDATA[email marketing]]></category><category><![CDATA[customer experience]]></category><category><![CDATA[personalization]]></category><dc:creator><![CDATA[Akshay Deogiri]]></dc:creator><pubDate>Fri, 02 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8df25e6bfb86cc0a01eee7d2fdbc8a7b/58556/email-automation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  The chances are that as a marketer, you’re already segmenting your audience and sending them targeted emails. But is that enough? Making your emails relevant is one thing, and making them interesting and engaging is something completely different. If implemented correctly, personalization is a powerful tool that can help you engage your audience and nurture your leads. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-leverage-email-automation-personalization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Akshay Deogiri&amp;size=100</authorImage></item><item><title><![CDATA[Cyber Security Round-Up: What Happened in June 2021]]></title><description><![CDATA[Cybersecurity isn’t just an IT issue anymore. It has caused substantial losses to businesses, governments, and individuals around the world. In this blog, we will look at the top security breaches in June 2021.]]></description><link>https://www.loginradius.com/blog/identity/cybersec-roundup-june-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cybersec-roundup-june-2021/</guid><category><![CDATA[other]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 01 Jul 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4034ab174208315d71641eba87aee31/58556/cybersec-roundup-june-2021-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cybersecurity isn’t just an IT issue anymore. It has caused substantial losses to businesses, governments, and individuals around the world. In this blog, we will look at the top security breaches in June 2021. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cybersec-roundup-june-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Omnichannel CX : Your Key to Consumer Experience Success]]></title><description><![CDATA[Companies that want to create an omnichannel experience must ensure their marketing goals, objectives, messages, and design are consistent across all channels. A company's marketing, consumer service, and user experience may all be improved by combining these elements.]]></description><link>https://www.loginradius.com/blog/growth/what-is-omnichannel-cx/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/what-is-omnichannel-cx/</guid><dc:creator><![CDATA[Tanvi Soni]]></dc:creator><pubDate>Wed, 30 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9e695be5402cd760085f5d84881e32ca/58556/Omnichannel-CX.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Companies that want to create an omnichannel experience must ensure their marketing goals, objectives, messages, and design are consistent across all channels. A company&apos;s marketing, consumer service, and user experience may all be improved by combining these elements. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/what-is-omnichannel-cx/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Tanvi Soni&amp;size=100</authorImage></item><item><title><![CDATA[How QR Codes are Shaping the Future of Marketing]]></title><description><![CDATA[From redirecting customers to social media pages to asking them to leave feedback and review, enterprises can do a lot through a QR Code. This insightful read covers all the aspects that depict the role of QR codes in enhancing marketing for enterprises during uncertain times.]]></description><link>https://www.loginradius.com/blog/growth/qr-code-in-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/qr-code-in-marketing/</guid><category><![CDATA[brand identity]]></category><category><![CDATA[smart authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Mon, 28 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/93ef82d386c6360ef7dc8ef99649c02a/58556/qr-codes-digital-contactless-payments.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; From redirecting customers to social media pages to asking them to leave feedback and review, enterprises can do a lot through a QR Code. This insightful read covers all the aspects that depict the role of QR codes in enhancing marketing for enterprises during uncertain times. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/qr-code-in-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How Businesses are Experiencing Digital Transformation with Consumer IAM]]></title><description><![CDATA[Digital transformation empowers businesses to change the way they operate. It’s not just a buzzword or marketing gimmick, it’s a real and tangible way to revamp how you do business and improve your company. Let’s understand it through the lens of consumer IAM.]]></description><link>https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 25 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7bc60a75f46149361e6c5f4a350de05d/58556/digital-transformation-consumer-iam-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital transformation empowers businesses to change the way they operate. It’s not just a buzzword or marketing gimmick, it’s a real and tangible way to revamp how you do business and improve your company. Let’s understand it through the lens of consumer IAM. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Add Authentication to Play Framework With OIDC and LoginRadius]]></title><description><![CDATA[Learn how to integrate play-pac4j and use its OIDC support to authenticate with LoginRadius using JAVA play framework.]]></description><link>https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/</guid><category><![CDATA[OIDC]]></category><category><![CDATA[Java]]></category><category><![CDATA[pac4j]]></category><category><![CDATA[Play Framework]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Vishnu Chilamakuru]]></dc:creator><pubDate>Fri, 25 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20973f3ab172cea4306baad7dd6cba11/58556/pac4j-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to integrate play-pac4j and use its OIDC support to authenticate with LoginRadius using JAVA play framework. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/vishnuchilamakuru.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Brand Authenticity is Important & How to Build it]]></title><description><![CDATA[Today's world is increasingly clamoring for authenticity. Companies, especially brands, are being held accountable to consumers' demands and judgments about their sincerity. To many people, authenticity is more important than hope.]]></description><link>https://www.loginradius.com/blog/growth/why-brand-authenticity-is-important/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/why-brand-authenticity-is-important/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 24 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/16d9d7ace93390a3a944010728f7213d/58556/brand-engagement.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today&apos;s world is increasingly clamoring for authenticity. Companies, especially brands, are being held accountable to consumers&apos; demands and judgments about their sincerity. To many people, authenticity is more important than hope. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/why-brand-authenticity-is-important/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[React renderers, react everywhere?]]></title><description><![CDATA[There is an advanced feature of React is that it can write renderers for multiple different env.]]></description><link>https://www.loginradius.com/blog/engineering/react-renderer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-renderer/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[React]]></category><category><![CDATA[Renderer]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Wed, 23 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c78e466846f6ee90e75611967e696733/58556/react.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; There is an advanced feature of React is that it can write renderers for multiple different env. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-renderer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[What is SAML SSO?]]></title><description><![CDATA[SAML SSO is an authentication standard for single sign-on (SSO) based on XML. Learn more about how it works, advantages and its components.]]></description><link>https://www.loginradius.com/blog/identity/saml-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/saml-sso/</guid><category><![CDATA[saml]]></category><category><![CDATA[sso]]></category><category><![CDATA[user authentication]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Fri, 18 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/04b39458b580a5bc9971e50f378ae482/ad85c/saml-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SAML SSO is an authentication standard for single sign-on (SSO) based on XML. Learn more about how it works, advantages and its components. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/saml-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Consumer Onboarding Strategies for SaaS Businesses]]></title><description><![CDATA[Here’s the list of essential client onboarding strategies for SaaS businesses that yield better conversions when you have already allocated resources in terms of time, money, and energy for acquiring your consumers.]]></description><link>https://www.loginradius.com/blog/growth/consumer-onboarding-strategies-for-saas-businesses/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-onboarding-strategies-for-saas-businesses/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f58e5270a87f9314be5194967781678b/58556/customer-onboarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Here’s the list of essential client onboarding strategies for SaaS businesses that yield better conversions when you have already allocated resources in terms of time, money, and energy for acquiring your consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-onboarding-strategies-for-saas-businesses/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[A Glimpse into My 1-Year Journey at LoginRadius as a CSM!]]></title><description><![CDATA[LoginRadius has been a part of my life for more than a year now. A lot has happened and tons learned during the past year. I am ecstatic to share my journey, responsibilities, and my day-to-day activities as a Customer Success Manager at LoginRadius.]]></description><link>https://www.loginradius.com/blog/growth/loginradius-journey-csm/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/loginradius-journey-csm/</guid><dc:creator><![CDATA[Jennifer Chan]]></dc:creator><pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6a877f57d81f17464a8beae0ae08dd1d/58556/loginradius-journey-csm-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius has been a part of my life for more than a year now. A lot has happened and tons learned during the past year. I am ecstatic to share my journey, responsibilities, and my day-to-day activities as a Customer Success Manager at LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/loginradius-journey-csm/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jennifer Chan&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Offers Additional Security Layer through Newly-Enhanced Step-up Authentication Feature]]></title><description><![CDATA[Step-up authentication enhances consumer and enterprise security by adding an extra layer of authentication. It offers a competitive edge to businesses seeking innovative ways to enhance security for their website.]]></description><link>https://www.loginradius.com/blog/identity/step-up-authentication-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/step-up-authentication-loginradius/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b376cb42777090f33c01d89daf7f58ce/58556/step-up-authentication-loginradius-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Step-up authentication enhances consumer and enterprise security by adding an extra layer of authentication. It offers a competitive edge to businesses seeking innovative ways to enhance security for their website. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/step-up-authentication-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Big Merchants Need to Deliver a Unified Consumer Experience?]]></title><description><![CDATA[The concept of unified consumer experience may sound idealistic or poignant, but anyone who rejects it is woefully out of context. Consumers have become a competitive differentiator in today's hyper-competitive and hyper-connected global marketplace. There is tangible business value in maintaining an effective consumer experience.]]></description><link>https://www.loginradius.com/blog/identity/unified-cx-retail/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/unified-cx-retail/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 15 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/19b8c24d4aaa45fde2f41c4e7fd96c75/58556/unified-cx-retail-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The concept of unified consumer experience may sound idealistic or poignant, but anyone who rejects it is woefully out of context. Consumers have become a competitive differentiator in today&apos;s hyper-competitive and hyper-connected global marketplace. There is tangible business value in maintaining an effective consumer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/unified-cx-retail/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[3 Product Marketing Tips for B2C CMOs]]></title><description><![CDATA[Choosing the right product marketing strategy can assist you in taking your product to the next level. Read this detailed article to find out how your company can benefit by adopting an effective product marketing strategy.]]></description><link>https://www.loginradius.com/blog/growth/product-marketing-tips-for-b2c/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/product-marketing-tips-for-b2c/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 14 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f703d718c5099de83ff8bd2693608625/58556/Product-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Choosing the right product marketing strategy can assist you in taking your product to the next level. Read this detailed article to find out how your company can benefit by adopting an effective product marketing strategy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/product-marketing-tips-for-b2c/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[All About Google One Tap Login—Explained!]]></title><description><![CDATA[Consumers prefer basic login experiences over complicated signup procedures. The Google One-Tap Login feature, available on Android phones, allows users to quickly sign up for apps or web services with their Google credentials without creating an account.]]></description><link>https://www.loginradius.com/blog/identity/google-one-tap-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/google-one-tap-login/</guid><category><![CDATA[social login]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Fri, 11 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/81cfb4344e517eb67e754f31ceb65391/58556/google-onetaplogin-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Consumers prefer basic login experiences over complicated signup procedures. The Google One-Tap Login feature, available on Android phones, allows users to quickly sign up for apps or web services with their Google credentials without creating an account. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/google-one-tap-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[What to Do if Someone Steals Your JSON Web Token?]]></title><description><![CDATA[JWT tokens provide secure access to an authenticated user, and attackers are always looking for ways to steal these tokens and quickly gain access by impersonating a consumer. Here we’ve clubbed efficient ways for enterprises to ensure maximum security and steps that can help in a situation where a client’s JSON web token is stolen.]]></description><link>https://www.loginradius.com/blog/identity/json-web-token-stolen/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/json-web-token-stolen/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 10 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/74d3ad6eff38db8a802d31944e07276b/58556/json-web-token-stolen-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; JWT tokens provide secure access to an authenticated user, and attackers are always looking for ways to steal these tokens and quickly gain access by impersonating a consumer. Here we’ve clubbed efficient ways for enterprises to ensure maximum security and steps that can help in a situation where a client’s JSON web token is stolen. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/json-web-token-stolen/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is Web SSO]]></title><description><![CDATA[ Web SSO is a part of Single Sign-On that brings everything together. Each consumer has one account and one set of credentials that they can use anywhere to interact with your brand. Failing to use SSO will make your consumers notice you in a bad light as they try to navigate your apps and services.]]></description><link>https://www.loginradius.com/blog/identity/what-is-web-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-web-sso/</guid><category><![CDATA[web sso]]></category><category><![CDATA[mfa]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Vaibhav Jain]]></dc:creator><pubDate>Thu, 10 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bee618114da3fc8156bfae628d5ba6f1/7f8e9/web-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Web SSO is a part of Single Sign-On that brings everything together. Each consumer has one account and one set of credentials that they can use anywhere to interact with your brand. Failing to use SSO will make your consumers notice you in a bad light as they try to navigate your apps and services. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-web-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vaibhav Jain&amp;size=100</authorImage></item><item><title><![CDATA[React's Context API Guide with Example]]></title><description><![CDATA[Deep Dive into React's Context API with example]]></description><link>https://www.loginradius.com/blog/engineering/react-context-api-guide-with-example/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-context-api-guide-with-example/</guid><category><![CDATA[React]]></category><category><![CDATA[Redux]]></category><category><![CDATA[Hooks]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6a87bd8ebde082f5a6d9c7c0bb658776/58556/title-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Deep Dive into React&apos;s Context API with example &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-context-api-guide-with-example/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Boost Creativity With The Best Brainstorming Tools And Techniques]]></title><description><![CDATA[A good brainstorming tool should be specific, have a good concept behind it, and most importantly, it should help you gather better ideas. Bonus points if these qualities are in the same package. Read this blog to learn about the best brainstorming tools and techniques that you can use at work.]]></description><link>https://www.loginradius.com/blog/growth/best-brainstorming-tools-and-techniques/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/best-brainstorming-tools-and-techniques/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f51d41f6f7a3b1453652482e56e2be92/7be74/best-brainstorming-tools-and-techniques.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A good brainstorming tool should be specific, have a good concept behind it, and most importantly, it should help you gather better ideas. Bonus points if these qualities are in the same package. Read this blog to learn about the best brainstorming tools and techniques that you can use at work. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/best-brainstorming-tools-and-techniques/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[Working With Industry Authorization: A Beginner's Guide to OAuth 2.0]]></title><description><![CDATA[ OAuth 2.0 is an authorization protocol designed to control access within a web application or a mobile application. Here’s an interesting read showcasing the role of OAuth 2.0 for offering secure access to resources and why enterprises should get it in place.]]></description><link>https://www.loginradius.com/blog/identity/oauth2-0-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/oauth2-0-guide/</guid><category><![CDATA[data security]]></category><category><![CDATA[authorization]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 08 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0ff589bc47fa3a11f610ed110dc445db/09b0e/OAuth2.0-guide-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  OAuth 2.0 is an authorization protocol designed to control access within a web application or a mobile application. Here’s an interesting read showcasing the role of OAuth 2.0 for offering secure access to resources and why enterprises should get it in place. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/oauth2-0-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Password History, Expiration, and Complexity: Explained!]]></title><description><![CDATA[Passwords are the only measures that help us immensely to protect our data. So don't you think our protector should be more robust? This blog explores the various techniques which you can embed to push your password security to the next level.]]></description><link>https://www.loginradius.com/blog/identity/password-history-expiration-complexity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/password-history-expiration-complexity/</guid><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Ashish Kumar Yadav]]></dc:creator><pubDate>Tue, 08 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b2a55040701faca00b2b086098fa76b/58556/Passwordhistory_cover_pic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Passwords are the only measures that help us immensely to protect our data. So don&apos;t you think our protector should be more robust? This blog explores the various techniques which you can embed to push your password security to the next level. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/password-history-expiration-complexity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashish Kumar Yadav&amp;size=100</authorImage></item><item><title><![CDATA[SAML or OIDC: Which is Better For Your Business?]]></title><description><![CDATA[For any company concerned about securing its users' data, getting a grip on SSO can be a daunting task. But determining whether SAML or OIDC is right for your enterprise requires weighing a few characteristics against your business goals.]]></description><link>https://www.loginradius.com/blog/identity/saml-or-oidc-for-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/saml-or-oidc-for-business/</guid><category><![CDATA[saml]]></category><category><![CDATA[sso]]></category><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 08 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bed2d7c21e9c9d14724e57f42436470c/58556/saml-or-oidc-for-business-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; For any company concerned about securing its users&apos; data, getting a grip on SSO can be a daunting task. But determining whether SAML or OIDC is right for your enterprise requires weighing a few characteristics against your business goals. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/saml-or-oidc-for-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Should You Have A Blue Checkmark In Front of Your Twitter Account]]></title><description><![CDATA[While it may not be as important as it once was, the mainstream media is still a dominant way to build your online reputation, especially on Twitter. So, if you want to improve your brand recognition on Twitter, start by showing you are one of the 1 in 1,000 accounts deserving of a blue checkmark.]]></description><link>https://www.loginradius.com/blog/growth/how-to-add-twitter-blue-checkmark/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-add-twitter-blue-checkmark/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Fri, 04 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6a3f7beccf5f3c13d21a48b37d1c45f0/991d2/twitter-verified-account.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While it may not be as important as it once was, the mainstream media is still a dominant way to build your online reputation, especially on Twitter. So, if you want to improve your brand recognition on Twitter, start by showing you are one of the 1 in 1,000 accounts deserving of a blue checkmark. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-add-twitter-blue-checkmark/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[10 Reasons For Businesses to Implement SASE with a Zero Trust Strategy]]></title><description><![CDATA[The perimeter-based reactive methods that were the core of old and traditional security systems have become obsolete. The zero trust security model is the future of cybersecurity. But, it is valuable only when implemented across the company's entire network infrastructure. This is where SASE takes the lead.]]></description><link>https://www.loginradius.com/blog/identity/sase-zero-trust/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/sase-zero-trust/</guid><category><![CDATA[zero trust security]]></category><category><![CDATA[sase]]></category><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 04 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/053ae64a0cad75abe9e98ad71df40ee4/58556/sase-zero-trust-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The perimeter-based reactive methods that were the core of old and traditional security systems have become obsolete. The zero trust security model is the future of cybersecurity. But, it is valuable only when implemented across the company&apos;s entire network infrastructure. This is where SASE takes the lead. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/sase-zero-trust/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Implementing Authentication on Vue.js using JWTtoken]]></title><description><![CDATA[In recent times, when building a modern application, users are required to verify their identity. The process by which we carry out this verification is what we call authentication, and in this tutorial, we would look at how we can carry out this task using JWTauthentication on a Vuejs app.]]></description><link>https://www.loginradius.com/blog/engineering/implementing-authentication-on-vuejs-using-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/implementing-authentication-on-vuejs-using-jwt/</guid><category><![CDATA[Auth]]></category><category><![CDATA[JWT]]></category><category><![CDATA[Vue.js]]></category><dc:creator><![CDATA[Uma Victor]]></dc:creator><pubDate>Wed, 02 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eb6480e4e97fc3f7f136edd312b36f17/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In recent times, when building a modern application, users are required to verify their identity. The process by which we carry out this verification is what we call authentication, and in this tutorial, we would look at how we can carry out this task using JWTauthentication on a Vuejs app. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/implementing-authentication-on-vuejs-using-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://github.com/uma-victor1.png?size=100v=40</authorImage></item><item><title><![CDATA[Social Media Video Marketing: What Is In Store For Future Marketers]]></title><description><![CDATA[Video marketing is one of the digital decoration touches any business can have today. The future of digital videos has seen a tremendous rise; owing to the emergence of social media channels. Nowadays, every company is investing in video marketing, and more and more of those are being loaded up on various platforms.]]></description><link>https://www.loginradius.com/blog/growth/future-of-social-media-video-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/future-of-social-media-video-marketing/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Wed, 02 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a4689bbd5c39a12932a153e7ccc01e47/58556/social-videos.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Video marketing is one of the digital decoration touches any business can have today. The future of digital videos has seen a tremendous rise; owing to the emergence of social media channels. Nowadays, every company is investing in video marketing, and more and more of those are being loaded up on various platforms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/future-of-social-media-video-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Move beyond Traditional Risk Management with Holistic APIs]]></title><description><![CDATA[Organizations are now struggling more than ever before to face new risks, vulnerabilities, and privacy issues since they adopted a paradigm shift to remote working. This valuable read focuses on the importance of the adequate deployment of APIs that further reduces vulnerabilities and helps maintain a unified user experience.]]></description><link>https://www.loginradius.com/blog/identity/risk-management-with-holistic-apis/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/risk-management-with-holistic-apis/</guid><category><![CDATA[oauth]]></category><category><![CDATA[identity management]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 01 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1a011b4ca4277424b3c72afac04951d5/58556/risk-management-with-holistic%20apis-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Organizations are now struggling more than ever before to face new risks, vulnerabilities, and privacy issues since they adopted a paradigm shift to remote working. This valuable read focuses on the importance of the adequate deployment of APIs that further reduces vulnerabilities and helps maintain a unified user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/risk-management-with-holistic-apis/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Identity Provider: What Is It And Why Should You Invest In One?]]></title><description><![CDATA[Identity management integration is an essential process in today’s consumer-driven world. Identity providers are a great way to offer your consumers an easy sign-in method. So, when they are connecting to your website or online store, it can allow them to login once with their unique details and not have to remember multiple logins.]]></description><link>https://www.loginradius.com/blog/identity/what-is-identity-provider/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-identity-provider/</guid><category><![CDATA[identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 01 Jun 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bda289412c6b84b3bf96a8ae21454110/7f8e9/identity-provider.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity management integration is an essential process in today’s consumer-driven world. Identity providers are a great way to offer your consumers an easy sign-in method. So, when they are connecting to your website or online store, it can allow them to login once with their unique details and not have to remember multiple logins. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-identity-provider/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is User Session Management?]]></title><description><![CDATA[Implementing proper session management usually increases the strength and security of the session token.  And if you have not implemented it, then many vulnerabilities can be introduced with insecure session cookies that attackers can leverage to benefit an authenticated user session.]]></description><link>https://www.loginradius.com/blog/identity/user-session-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/user-session-management/</guid><category><![CDATA[user management]]></category><category><![CDATA[token authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Keshav Kumar]]></dc:creator><pubDate>Mon, 31 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ccfb91aa30b72f303c50ec60bc561612/71802/session_cover_pic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Implementing proper session management usually increases the strength and security of the session token.  And if you have not implemented it, then many vulnerabilities can be introduced with insecure session cookies that attackers can leverage to benefit an authenticated user session. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/user-session-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Keshav Kumar&amp;size=100</authorImage></item><item><title><![CDATA[How to create and use the Dictionary in C#]]></title><description><![CDATA[In this article, we will talk about how to create and use the Dictionary in C#.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-create-and-use-dictionary-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-create-and-use-dictionary-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[Dictionary]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Thu, 27 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/871aa846ba5748cf0934c5c38659bb08/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, we will talk about how to create and use the Dictionary in C#. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-create-and-use-dictionary-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[Will Focusing on Relationship Marketing Boost Your Business Sales?]]></title><description><![CDATA[In today’s business world, maintaining a strong, healthy relationship with consumers is pivotal. The fact remains that the internet is a permanent record and consumers do not forget. No matter how hard online marketers work to tweak their brand and build relationships with consumers online, one bad review can completely ruin it.]]></description><link>https://www.loginradius.com/blog/growth/boost-your-business-sales-with-marketing-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/boost-your-business-sales-with-marketing-business/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Thu, 27 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a11d7d24eff6fe4e720d97c3fadd47ae/58556/customer-relationship-for-business.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today’s business world, maintaining a strong, healthy relationship with consumers is pivotal. The fact remains that the internet is a permanent record and consumers do not forget. No matter how hard online marketers work to tweak their brand and build relationships with consumers online, one bad review can completely ruin it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/boost-your-business-sales-with-marketing-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[COVID-19 Vaccine Success in USA and Remote Working – What’s The Connection]]></title><description><![CDATA[With rejuvenated hope, suddenly, talks about returning to the office have become intense. While a complete transition may still seem like a long shot, the USA COVID-19 vaccine success can have a huge impact on the remote working culture. Let’s find out how!]]></description><link>https://www.loginradius.com/blog/growth/vaccine-success-can-impact-the-remote-working-culture/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/vaccine-success-can-impact-the-remote-working-culture/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 26 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a4abf01abfd8342b0f2bcfb2a6bd877f/761da/COVID-vaccines-for-remote-culture.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With rejuvenated hope, suddenly, talks about returning to the office have become intense. While a complete transition may still seem like a long shot, the USA COVID-19 vaccine success can have a huge impact on the remote working culture. Let’s find out how! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/vaccine-success-can-impact-the-remote-working-culture/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What is Risk-Based Authentication? And Why Should You Implement It?]]></title><description><![CDATA[RBA is a process of assessing the risk of an authentication request in real-time and requesting additional layers of authentication and identification based on the risk profile to validate that a user attempting to authenticate is who they claim to be.]]></description><link>https://www.loginradius.com/blog/engineering/risk-based-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/risk-based-authentication/</guid><category><![CDATA[RBA]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Raghunath Reddy]]></dc:creator><pubDate>Tue, 25 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5b01c860ee1c60243f1ede7dc2a060c2/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; RBA is a process of assessing the risk of an authentication request in real-time and requesting additional layers of authentication and identification based on the risk profile to validate that a user attempting to authenticate is who they claim to be. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/risk-based-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/raghunath-r-a.png?size=100v=40</authorImage></item><item><title><![CDATA[Want to Learn Copywriting? 3 Tips That Will Keep Readers Glued to Your Content]]></title><description><![CDATA[Users are more likely to be receptive to content that inspires an emotional reaction. That’s why your current SEO strategy isn’t working. You can get site visitors, but you aren’t keeping them there for the long term. Check out our list of the most effective copywriting hacks that will help you increase your writing productivity and effectiveness.]]></description><link>https://www.loginradius.com/blog/growth/how-to-learn-copywriting/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-learn-copywriting/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 25 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7564ad289bbfae7594446085c84f4aff/71802/learn-copywriting.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Users are more likely to be receptive to content that inspires an emotional reaction. That’s why your current SEO strategy isn’t working. You can get site visitors, but you aren’t keeping them there for the long term. Check out our list of the most effective copywriting hacks that will help you increase your writing productivity and effectiveness. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-learn-copywriting/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How Entertainment Companies Use the LoginRadius CIAM platform]]></title><description><![CDATA[Every industry takes a different approach to identity management. When it comes to media and entertainment, viewers love to move around a lot. As a result, before embarking on the journey, organizations must first understand a few things. For example, what goal they hope to achieve, how does a CIAM platform fits into the picture, and how do they find the best solution.]]></description><link>https://www.loginradius.com/blog/identity/media-entertainment-use-loginradius-platform/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/media-entertainment-use-loginradius-platform/</guid><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Tue, 25 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4559801deea09db3f388c50be7cd7366/58556/media-entertainment-use-loginradius-platform-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Every industry takes a different approach to identity management. When it comes to media and entertainment, viewers love to move around a lot. As a result, before embarking on the journey, organizations must first understand a few things. For example, what goal they hope to achieve, how does a CIAM platform fits into the picture, and how do they find the best solution. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/media-entertainment-use-loginradius-platform/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[React Error Boundaries]]></title><description><![CDATA[Error Handling in React using React Error Boundaries]]></description><link>https://www.loginradius.com/blog/engineering/react-error-boundaries/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-error-boundaries/</guid><category><![CDATA[React]]></category><category><![CDATA[Error Handling]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Thu, 20 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fbbddc79e1423b5aad77631cb84f527d/58556/error_boundary_cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Error Handling in React using React Error Boundaries &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-error-boundaries/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Consumer Data Protection: How to Handle Data Breaches in Your Business]]></title><description><![CDATA[With the increasing number of data breaches across the globe, securely managing consumer data is becoming more crucial than ever before. Here are some efficient ways for consumer data protection that every online business must emphasize to ensure a secure line of defense against cyber-attacks.]]></description><link>https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 20 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/db67bada2b417e5301579e19c2c2ce54/58556/how-to-handle-data-breaches-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the increasing number of data breaches across the globe, securely managing consumer data is becoming more crucial than ever before. Here are some efficient ways for consumer data protection that every online business must emphasize to ensure a secure line of defense against cyber-attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Top 5 User Provisioning Mistakes Enterprises Should Avoid in 2021]]></title><description><![CDATA[ It’s crucial for online businesses that are collecting user information and storing the same over the cloud to ensure data safety best practices are in place to safeguard clients’ identity and privacy. This insightful read lists some of the common mistakes that enterprises must avoid in 2021 and beyond.]]></description><link>https://www.loginradius.com/blog/identity/user-provisioning-mistakes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/user-provisioning-mistakes/</guid><category><![CDATA[user provisioning]]></category><category><![CDATA[rba]]></category><category><![CDATA[access management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 20 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a1d8baddd6ea91b1e9506c33b55e328a/58556/user-provisioning-mistakes-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  It’s crucial for online businesses that are collecting user information and storing the same over the cloud to ensure data safety best practices are in place to safeguard clients’ identity and privacy. This insightful read lists some of the common mistakes that enterprises must avoid in 2021 and beyond. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/user-provisioning-mistakes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Cybersecurity Tips for Ecommerce Websites]]></title><description><![CDATA[Whether you run a big business or a small niche online store, you should always be on your guard against possible security threats. Here are some of the most important tips to remember about keeping your site secure.]]></description><link>https://www.loginradius.com/blog/growth/cybersecurity-tips-for-ecommerce-websites/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/cybersecurity-tips-for-ecommerce-websites/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[David Smith]]></dc:creator><pubDate>Wed, 19 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/01fc9df2393f4d88adce94b315a8cb41/58556/cybersecurity-tips-for-ecommerce.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether you run a big business or a small niche online store, you should always be on your guard against possible security threats. Here are some of the most important tips to remember about keeping your site secure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/cybersecurity-tips-for-ecommerce-websites/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=David Smith&amp;size=100</authorImage></item><item><title><![CDATA[Data Masking In Nginx Logs For User Data Privacy And Compliance]]></title><description><![CDATA[Learn about data masking in nginx logs for user data privacy and compliance.]]></description><link>https://www.loginradius.com/blog/engineering/user-privacy-data-masking-in-nginx-logs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/user-privacy-data-masking-in-nginx-logs/</guid><category><![CDATA[Nginx]]></category><category><![CDATA[Logs]]></category><category><![CDATA[Data Masking]]></category><category><![CDATA[Compliance]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Tue, 18 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e50f9d5601792a8e4e32b1b89444ca3b/991d2/data-masking-in-nginx-logs-for-user-data-privacy-and-compliance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about data masking in nginx logs for user data privacy and compliance. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/user-privacy-data-masking-in-nginx-logs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Features of Google My Business You Should Be Using]]></title><description><![CDATA[Google My Business is a free tool that allows small and local businesses to increase their visibility on Google’s search engine to gain new customers. We’ve covered the top 5 features you should be using to make your business more visible and get you started.]]></description><link>https://www.loginradius.com/blog/growth/top-5-features-of-google-my-business-for-marketers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-5-features-of-google-my-business-for-marketers/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Tue, 18 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f46cea3f25cf3ee027f3315b0f7ac160/e557c/Google-Local-Business.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Google My Business is a free tool that allows small and local businesses to increase their visibility on Google’s search engine to gain new customers. We’ve covered the top 5 features you should be using to make your business more visible and get you started. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-5-features-of-google-my-business-for-marketers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Myth or True - Is AI Really Transforming the Digital Marketing Industry?]]></title><description><![CDATA[In this article, with AI technology, marketers can spot microtrends and even predict trends and leveraging AI digital marketing to save time and resources through automated digital marketing services.]]></description><link>https://www.loginradius.com/blog/growth/is-ai-really-transforming-the-digital-marketing-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/is-ai-really-transforming-the-digital-marketing-industry/</guid><dc:creator><![CDATA[Ashley Lipman]]></dc:creator><pubDate>Tue, 18 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a556065f3e3643fcf7de8c666a3381c8/58556/AI-Myth-True.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, with AI technology, marketers can spot microtrends and even predict trends and leveraging AI digital marketing to save time and resources through automated digital marketing services. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/is-ai-really-transforming-the-digital-marketing-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashley Lipman&amp;size=100</authorImage></item><item><title><![CDATA[The Digitization of Agile Marketing Principles - How Has It Changed Over the Years]]></title><description><![CDATA[Agile Marketing is an alternative form of marketing that involves the use of tangible data and analytics to find opportunities for an increase in revenue or a search for solutions in real-time. The characteristic feature of this kind of marketing is that a team of developers and marketing personnel will focus on high-value projects.]]></description><link>https://www.loginradius.com/blog/growth/digitization-of-agile-marketing-principles/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/digitization-of-agile-marketing-principles/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 17 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cc8b744a3f7282a9ce5d91602ecdffae/58556/Agile-Marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Agile Marketing is an alternative form of marketing that involves the use of tangible data and analytics to find opportunities for an increase in revenue or a search for solutions in real-time. The characteristic feature of this kind of marketing is that a team of developers and marketing personnel will focus on high-value projects. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/digitization-of-agile-marketing-principles/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Code spliting in React via lazy and suspense]]></title><description><![CDATA[Load Application faster with code spliting and dynamic loading]]></description><link>https://www.loginradius.com/blog/engineering/react-code-splitting-with-lazy-suspense/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-code-splitting-with-lazy-suspense/</guid><category><![CDATA[React]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Thu, 13 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d480583c72a493c3dcd199f93b058a7d/58556/react.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Load Application faster with code spliting and dynamic loading &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-code-splitting-with-lazy-suspense/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Use Twitter for B2B Marketing in 2021]]></title><description><![CDATA[Twitter accounts are becoming quite popular, with 82% of companies using Twitter for B2B marketing. Here are some ways to use this network to capitalize on new partnerships and customer relationships. Read this blog also to learn how to create a solid B2B Twitter marketing plan.]]></description><link>https://www.loginradius.com/blog/growth/twitter-for-b2b-marketing-in-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/twitter-for-b2b-marketing-in-2021/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 13 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bc20c943fbb9c7670e9bb33d310919a3/58556/Twitter-for-B2B-Marketing-in-2021.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Twitter accounts are becoming quite popular, with 82% of companies using Twitter for B2B marketing. Here are some ways to use this network to capitalize on new partnerships and customer relationships. Read this blog also to learn how to create a solid B2B Twitter marketing plan. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/twitter-for-b2b-marketing-in-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How Secure is Two-Factor Authentication (2FA)?]]></title><description><![CDATA[While we know that it may seem childish to use a password and a username combination, unfortunately, many people don’t learn the risks associated with this type of authentication until they have been victimized by cybercrime. And when that happens, two-factor authentication is one the best ways to protect your consumers’ sensitive data from theft.]]></description><link>https://www.loginradius.com/blog/identity/how-secure-2fa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-secure-2fa/</guid><category><![CDATA[data security]]></category><category><![CDATA[2fa]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Thu, 13 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8bd455bea6a1739114c0ff834a5099d3/58556/how-secure-2fa-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While we know that it may seem childish to use a password and a username combination, unfortunately, many people don’t learn the risks associated with this type of authentication until they have been victimized by cybercrime. And when that happens, two-factor authentication is one the best ways to protect your consumers’ sensitive data from theft. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-secure-2fa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Implement Authentication in React Applications using LoginRadius CLI ]]></title><description><![CDATA[In this tutorial, we will learn about implementing authentication for React applications using LoginRadius in under 5 mins. We will be using the LoginRadius CLI, through which we can perform basic actions of the LoginRadius Dashboard on the command line in a fast and proficient manner.]]></description><link>https://www.loginradius.com/blog/engineering/implement-authentication-in-react-using-loginradius-cli/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/implement-authentication-in-react-using-loginradius-cli/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[React]]></category><category><![CDATA[CLI]]></category><category><![CDATA[LoginRadius CLI]]></category><dc:creator><![CDATA[Akash Patil]]></dc:creator><pubDate>Wed, 12 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/588aa544e688ead4b827e6e3fee882fb/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, we will learn about implementing authentication for React applications using LoginRadius in under 5 mins. We will be using the LoginRadius CLI, through which we can perform basic actions of the LoginRadius Dashboard on the command line in a fast and proficient manner. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/implement-authentication-in-react-using-loginradius-cli/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/Akash-Patil.png?size=100v=40</authorImage></item><item><title><![CDATA[Benefits of Google Tag Manager — Easy To Use And Easy To Launch]]></title><description><![CDATA[Google Tag Manager provides a simple, cost-effective solution for managing all of your tags and code snippets. It is even free for small teams. With powerful yet easy-to-learn tools, Google Tag Manager lets you track data across all of your digital channels.]]></description><link>https://www.loginradius.com/blog/growth/benefits-of-google-tag-manager/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/benefits-of-google-tag-manager/</guid><dc:creator><![CDATA[Rashmi Mathur]]></dc:creator><pubDate>Tue, 11 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3f85779abd71f2dc76f46c6c46cdd0bd/58556/Google-Tag-Manager.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Google Tag Manager provides a simple, cost-effective solution for managing all of your tags and code snippets. It is even free for small teams. With powerful yet easy-to-learn tools, Google Tag Manager lets you track data across all of your digital channels. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/benefits-of-google-tag-manager/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Mathur&amp;size=100</authorImage></item><item><title><![CDATA[The Changing Role of Identity Management in Enterprise Decision-Making]]></title><description><![CDATA[The increasingly sophisticated audience now considers digital interactions as the sole mechanism for interacting with brands. Let’s learn how an identity management solution helps these brands to deliver rich user experiences backed by adequate data security.]]></description><link>https://www.loginradius.com/blog/identity/ciam-role-enterprise-decision-making/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-role-enterprise-decision-making/</guid><category><![CDATA[identity management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Tue, 11 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/692128ec97a2f789e1fdb866c8a678d8/58556/ciam-role-enterprise-decision-making-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The increasingly sophisticated audience now considers digital interactions as the sole mechanism for interacting with brands. Let’s learn how an identity management solution helps these brands to deliver rich user experiences backed by adequate data security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-role-enterprise-decision-making/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Website Heat Mapping with Hotjar vs. Microsoft Clarity]]></title><description><![CDATA[A heatmap is a color-coded representation that shows you what elements on your website are getting the highest interaction (hot) and those that are getting the lowest (cold). There are two leading services, namely Hotjar and Clarity, that are competing to win this space. Read this blog to find out which is best for your business.]]></description><link>https://www.loginradius.com/blog/growth/hotjar-vs-microsoft-clarity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/hotjar-vs-microsoft-clarity/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Fri, 07 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/72ea3a7d1fc8374c56524611c5bd9e30/1713a/hotjar-vs-ms-clarity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A heatmap is a color-coded representation that shows you what elements on your website are getting the highest interaction (hot) and those that are getting the lowest (cold). There are two leading services, namely Hotjar and Clarity, that are competing to win this space. Read this blog to find out which is best for your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/hotjar-vs-microsoft-clarity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[5 Reasons Why Cloud Governance Matters For Your Business]]></title><description><![CDATA[Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well.]]></description><link>https://www.loginradius.com/blog/identity/cloud-governance-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cloud-governance-business/</guid><category><![CDATA[cloud governance]]></category><category><![CDATA[compliance]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 07 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ab12548fc9c238d5787e624752425a94/58556/cloud-governance-business-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cloud-governance-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Implementing Effective Social Authentication Solution with LoginRadius]]></title><description><![CDATA[Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations. Let’s learn how LoginRadius simplifies social authentication and improves the overall user experience.]]></description><link>https://www.loginradius.com/blog/identity/social-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/social-authentication/</guid><category><![CDATA[social authentication]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 07 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8032381e207b200149f1faa05fd71e0e/58556/social-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations. Let’s learn how LoginRadius simplifies social authentication and improves the overall user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/social-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Duplicate Content and SEO: What’s the Big Deal]]></title><description><![CDATA[Dealing with duplicate content is a huge challenge for businesses seeking substantial growth through internet marketing practices. Learn about the aspects associated with duplicate content that depict the reasons behind it and how a business can overcome this lingering issue.]]></description><link>https://www.loginradius.com/blog/growth/duplicate-content-and-seo/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/duplicate-content-and-seo/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Thu, 06 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/50af237402d122b4976f5c79dd94c544/58556/duplicate-content-and-seo.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Dealing with duplicate content is a huge challenge for businesses seeking substantial growth through internet marketing practices. Learn about the aspects associated with duplicate content that depict the reasons behind it and how a business can overcome this lingering issue. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/duplicate-content-and-seo/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Top 5 tools to Audit Wordpress Website]]></title><description><![CDATA[SEO tools help rank your website on the first page of Google and other search engines. They monitor and audit your website's content and optimize it. You also receive a detailed report of what is working and what needs a change to improve the website's rank further.]]></description><link>https://www.loginradius.com/blog/growth/top-5-seo-tools-for-auditing-wordpress-website/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-5-seo-tools-for-auditing-wordpress-website/</guid><dc:creator><![CDATA[Tanvi Soni]]></dc:creator><pubDate>Thu, 06 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eed5690a4fe7491365dc5feeb43bead4/58556/top-5-wp-seo-tools.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SEO tools help rank your website on the first page of Google and other search engines. They monitor and audit your website&apos;s content and optimize it. You also receive a detailed report of what is working and what needs a change to improve the website&apos;s rank further. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-5-seo-tools-for-auditing-wordpress-website/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Tanvi Soni&amp;size=100</authorImage></item><item><title><![CDATA[The Future of Authentication is Passwordless With Magic links]]></title><description><![CDATA[By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links.]]></description><link>https://www.loginradius.com/blog/identity/passwordless-magic-links/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passwordless-magic-links/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 05 May 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/04d8470ad4d32ae97e55ca5a42770b53/58556/passwordless-magic-links-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passwordless-magic-links/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What is recoil.js and how it is managing in react?]]></title><description><![CDATA[Recoil is an experimental state management library and It provides several capabilities that are difficult to achieve with React alone.In this article we learn about the recoil.js, and how it is managing state in react.]]></description><link>https://www.loginradius.com/blog/engineering/recoiling-the-react/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/recoiling-the-react/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[React]]></category><category><![CDATA[Recoil]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/208ac01a1815902a049ffe0d62ef3730/58556/react.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Recoil is an experimental state management library and It provides several capabilities that are difficult to achieve with React alone.In this article we learn about the recoil.js, and how it is managing state in react. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/recoiling-the-react/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[A Brief Guide to Online Reputation Management (ORM)]]></title><description><![CDATA[The online reputation of a brand is the key to business success regardless of the industry and niche in today’s digital epoch. Let’s learn everything about online reputation management services and why it’s important, and how businesses can improve their web reputation.]]></description><link>https://www.loginradius.com/blog/growth/a-brief-guide-to-online-reputation-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/a-brief-guide-to-online-reputation-management/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/34e48bee8affcd0cfb1c4cd12adf7315/58556/online-reputation-management-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The online reputation of a brand is the key to business success regardless of the industry and niche in today’s digital epoch. Let’s learn everything about online reputation management services and why it’s important, and how businesses can improve their web reputation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/a-brief-guide-to-online-reputation-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Maintaining Quality Data Security Practices]]></title><description><![CDATA[Data security is important for businesses today, more than it ever was. By definition, data security is the practice of protecting digital information from unauthorised access, cyber corruption or theft.]]></description><link>https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4ae55216e5b0f5f97aff1b56fd8ebe9a/58556/data-security-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Data security is important for businesses today, more than it ever was. By definition, data security is the practice of protecting digital information from unauthorised access, cyber corruption or theft. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Handling Scalability and Enhancing Security with LoginRadius]]></title><description><![CDATA[Without a highly scalable infrastructure, it is not possible to handle increasing account creations and logins. Even peak loads can dramatically impede performance and degrade the consumer experience for any business. Learn how LoginRadius empowers businesses to deliver a secure and delightful user experience to their consumers.]]></description><link>https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/053ae64a0cad75abe9e98ad71df40ee4/58556/handling-scalability-security-loginradius-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Without a highly scalable infrastructure, it is not possible to handle increasing account creations and logins. Even peak loads can dramatically impede performance and degrade the consumer experience for any business. Learn how LoginRadius empowers businesses to deliver a secure and delightful user experience to their consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How Enum.TryParse() works in C#]]></title><description><![CDATA[In this article, I will talk about how Enum.TryParse() works in C# and mistake which we can make while using it.]]></description><link>https://www.loginradius.com/blog/engineering/how-enum-tryparse-works-in-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-enum-tryparse-works-in-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[Enum]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Wed, 28 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2df70abcd200dccf1e018d7875c31a92/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, I will talk about how Enum.TryParse() works in C# and mistake which we can make while using it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-enum-tryparse-works-in-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[Instagram vs Facebook – Which One is Better for Your Business in 2021?]]></title><description><![CDATA[Even the most experienced video content creators use a system to make sure everything goes smoothly so they don't miss deadlines or lose track of what they need to do next. A transparent plan with checklists and milestones will help you adopt a more professional tone in your videos.]]></description><link>https://www.loginradius.com/blog/growth/instagram-vs-facebook-which-one-is-better-for-your-business-in-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/instagram-vs-facebook-which-one-is-better-for-your-business-in-2021/</guid><category><![CDATA[social media]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 28 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ccbc2d0410adc2678a4358298b88f080/58556/Facebook-Instagram.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Even the most experienced video content creators use a system to make sure everything goes smoothly so they don&apos;t miss deadlines or lose track of what they need to do next. A transparent plan with checklists and milestones will help you adopt a more professional tone in your videos. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/instagram-vs-facebook-which-one-is-better-for-your-business-in-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Introduction to Mobile Biometric Authentication]]></title><description><![CDATA[In an increasingly digitized world, password-based authentication is no longer sufficient to secure applications and software tools.  Can biometrics replace traditional passwords in user authentication? Biometrics does offer a safe and easy mode of authenticating users – without compromising their online experience.]]></description><link>https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/</guid><category><![CDATA[mobile biometric authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Wed, 28 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/078ea7dff984bfd507bd9ddbae05995b/58556/what-is-mob-biometric-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In an increasingly digitized world, password-based authentication is no longer sufficient to secure applications and software tools.  Can biometrics replace traditional passwords in user authentication? Biometrics does offer a safe and easy mode of authenticating users – without compromising their online experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[10 Video Marketing Stats That Brands Can't Ignore in 2021]]></title><description><![CDATA[Even the most experienced video content creators use a system to make sure everything goes smoothly so they don't miss deadlines or lose track of what they need to do next. A transparent plan with checklists and milestones will help you adopt a more professional tone in your videos.]]></description><link>https://www.loginradius.com/blog/growth/10-video-marketing-stats-that-brands-cant-ignore-in-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/10-video-marketing-stats-that-brands-cant-ignore-in-2021/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 26 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bd6d77d15c96992bbaf74d929fc5f327/58556/video-marketing-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Even the most experienced video content creators use a system to make sure everything goes smoothly so they don&apos;t miss deadlines or lose track of what they need to do next. A transparent plan with checklists and milestones will help you adopt a more professional tone in your videos. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/10-video-marketing-stats-that-brands-cant-ignore-in-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Data Security in Hospitality: Best Practices for Operating In a Post-COVID Era]]></title><description><![CDATA[The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.]]></description><link>https://www.loginradius.com/blog/identity/data-security-hospitality-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-security-hospitality-industry/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 23 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3f84275b09f61f930ebfe6da82ed7439/58556/data-security-hospitality-industry-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-security-hospitality-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Three Unique PR Trends to Consider in 2021]]></title><description><![CDATA[The pandemic has also transformed Public Relations in ways that were hard to predict previously. Driven by trends like remote working, communications have undergone a significant metamorphosis. Can companies continue to pursue the traditional form of PR and risk falling behind their brand-building processes? Let’s find out.]]></description><link>https://www.loginradius.com/blog/growth/pr-trends-to-consider-in-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/pr-trends-to-consider-in-2021/</guid><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Thu, 22 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dc5694f042ec00ea765c5c084e1ab13e/58556/pr-trends-2021.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The pandemic has also transformed Public Relations in ways that were hard to predict previously. Driven by trends like remote working, communications have undergone a significant metamorphosis. Can companies continue to pursue the traditional form of PR and risk falling behind their brand-building processes? Let’s find out. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/pr-trends-to-consider-in-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Quick Steps to Leverage your Website for More Conversions]]></title><description><![CDATA[Marketers need to put their best foot forward in understanding their targeted audience and what exactly they’re looking for in a business website. The quick strategies described in this blog can be quite fruitful for every business regardless of the industry to enhance conversion rates and improve overall traffic.]]></description><link>https://www.loginradius.com/blog/growth/leverage-website-for-more-conversions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/leverage-website-for-more-conversions/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 21 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f37d0fc9834e1cd7813e74ec9ae20aae/58556/Leads-conversion-Loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Marketers need to put their best foot forward in understanding their targeted audience and what exactly they’re looking for in a business website. The quick strategies described in this blog can be quite fruitful for every business regardless of the industry to enhance conversion rates and improve overall traffic. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/leverage-website-for-more-conversions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[The Role of Identity management in the media industry]]></title><description><![CDATA[Media industry has witnessed a tremendous digital transformation journey. But besides the rapid technological enhancement of the media industry, several security challenges linger on businesses serving in this vertical. Here’s an insightful read depicting the role of identity management in the media industry.]]></description><link>https://www.loginradius.com/blog/identity/identity-management-in-media-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-management-in-media-industry/</guid><category><![CDATA[identity management]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 21 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/afb4116b2be53a2d72afce390ed0dd57/58556/identity-management-in-media-industry-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Media industry has witnessed a tremendous digital transformation journey. But besides the rapid technological enhancement of the media industry, several security challenges linger on businesses serving in this vertical. Here’s an insightful read depicting the role of identity management in the media industry. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-management-in-media-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Top UI/UX Design Tools 2021]]></title><description><![CDATA[In the current situation in 2021, with so many designing tools in the market, it has become difficult to choose the perfect one. Let’s get the insights of the top UI/UX design tools, compare their features, and choose the perfect fit for you!]]></description><link>https://www.loginradius.com/blog/growth/top-ui-ux-design-tools-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-ui-ux-design-tools-2021/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 19 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/628283178449c78f2ebad56767715a30/58556/best-ui-ux-design-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the current situation in 2021, with so many designing tools in the market, it has become difficult to choose the perfect one. Let’s get the insights of the top UI/UX design tools, compare their features, and choose the perfect fit for you! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-ui-ux-design-tools-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[React with Ref]]></title><description><![CDATA[Learn about manipulation of DOM elements with Ref directly with React]]></description><link>https://www.loginradius.com/blog/engineering/react-with-refs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-with-refs/</guid><category><![CDATA[React]]></category><category><![CDATA[Refs]]></category><category><![CDATA[DOM]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Fri, 16 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bb23ef2271007fb39da78689002e8d3b/58556/title-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about manipulation of DOM elements with Ref directly with React &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-with-refs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Video Testimonials Are A Marketing Must]]></title><description><![CDATA[Video testimonials offer more credibility than text-based reviews. They are much more effective in educating your target audience and increasing their trust in your brand. So, start focusing more on video testimonials instead of investing resources for developing text-based marketing collaterals. With time, you will get better at it and see an increase in sales.]]></description><link>https://www.loginradius.com/blog/growth/why-video-testimonials-are-a-marketing-must/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/why-video-testimonials-are-a-marketing-must/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 16 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/01f5b635983556817082bf727b012cec/58556/video-testimonial-client-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Video testimonials offer more credibility than text-based reviews. They are much more effective in educating your target audience and increasing their trust in your brand. So, start focusing more on video testimonials instead of investing resources for developing text-based marketing collaterals. With time, you will get better at it and see an increase in sales. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/why-video-testimonials-are-a-marketing-must/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[A Detailed Guide on How UX/UI Affects Registration]]></title><description><![CDATA[Login is a big deal that decides the entire UX your website is going to deliver. Businesses should try to put as little resistance as possible into their registration process. As with it comes customer identities—the most accurate first-party data beneficial for conversions and customer retention.]]></description><link>https://www.loginradius.com/blog/identity/how-ui-ux-affects-registration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-ui-ux-affects-registration/</guid><category><![CDATA[other]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 16 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5c100b3ce4a21c8b21938d462d2e7536/58556/how-ui-ux-affects-registration-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Login is a big deal that decides the entire UX your website is going to deliver. Businesses should try to put as little resistance as possible into their registration process. As with it comes customer identities—the most accurate first-party data beneficial for conversions and customer retention. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-ui-ux-affects-registration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What Is a Salt and How Does It Boost Security?]]></title><description><![CDATA[Ensuring that your passwords and data are safe is a top priority. Hashing and salting of passwords and cryptographic hash functions ensure the highest level of protection. By adding salt to your password, you can effectively thwart even the strongest password attacks.]]></description><link>https://www.loginradius.com/blog/identity/what-is-salt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-salt/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 16 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3c73b4421320db0c902de69c4e812a48/58556/what-is-salt-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Ensuring that your passwords and data are safe is a top priority. Hashing and salting of passwords and cryptographic hash functions ensure the highest level of protection. By adding salt to your password, you can effectively thwart even the strongest password attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-salt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Top 5 Marketing Strategies to Power-up Your Business]]></title><description><![CDATA[If you want to keep your consumers engaged, you need to avoid using the same marketing strategies over and over. This can bore your audience and cause them to forget about you. Your marketing efforts should be dynamic, which means one strategy won’t cut it for very long; that’s why you should keep reevaluating your strategies as the market grows.]]></description><link>https://www.loginradius.com/blog/growth/top-5-marketing-strategies-to-power-up-your-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-5-marketing-strategies-to-power-up-your-business/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Thu, 15 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ff7e3870523401bdc4eaa142027bd93e/58556/top-5-marketing-strategy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you want to keep your consumers engaged, you need to avoid using the same marketing strategies over and over. This can bore your audience and cause them to forget about you. Your marketing efforts should be dynamic, which means one strategy won’t cut it for very long; that’s why you should keep reevaluating your strategies as the market grows. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-5-marketing-strategies-to-power-up-your-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Login Using Microsoft Account]]></title><description><![CDATA[We have discussed how to use social login with a Microsoft account in this article and how it can benefit companies. This method of login streamlines the sign-in and registration processes, offering a convenient alternative to create accounts wherever needed. Moreover, it relieves the user of the mental burden of remembering multiple passwords created on various websites.]]></description><link>https://www.loginradius.com/blog/identity/login-using-microsoft-account/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/login-using-microsoft-account/</guid><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Vaibhav Jain]]></dc:creator><pubDate>Thu, 15 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1fdf17ecfff2d2c8d71c4f1603ac7572/58556/login-using-microsoft-account.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We have discussed how to use social login with a Microsoft account in this article and how it can benefit companies. This method of login streamlines the sign-in and registration processes, offering a convenient alternative to create accounts wherever needed. Moreover, it relieves the user of the mental burden of remembering multiple passwords created on various websites. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/login-using-microsoft-account/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vaibhav Jain&amp;size=100</authorImage></item><item><title><![CDATA[Implement Authentication in Angular 2+ application using LoginRadius CLI in 5 mins]]></title><description><![CDATA[In this tutorial, you will learn about how to implement the authentication for Angular 2+ application in just 5 mins. We will be using LoginRadius for authentication.]]></description><link>https://www.loginradius.com/blog/engineering/implementing-authentication-in-angular-2-plus-with-loginradius-cli/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/implementing-authentication-in-angular-2-plus-with-loginradius-cli/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Angular]]></category><category><![CDATA[CLI]]></category><category><![CDATA[LoginRadius CLI]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ab2ba564a1fcea45551f36b77f132cde/58556/angulat_demo_auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial, you will learn about how to implement the authentication for Angular 2+ application in just 5 mins. We will be using LoginRadius for authentication. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/implementing-authentication-in-angular-2-plus-with-loginradius-cli/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 10 Tips to Enhance Your Creativity While Working From Home]]></title><description><![CDATA[Working from home has its pros and cons. You can enjoy quality time with your family, save on travel expenses, and focus more on your kids. On the other hand, you might get bored after a while, miss those chats with your colleagues near the cooler, or yearn to go outside and breathe in fresh air. Here are some tips you can try to enhance your creativity while working from home.]]></description><link>https://www.loginradius.com/blog/growth/top-10-tips-to-enhance-your-creativity-while-working-from-home/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/top-10-tips-to-enhance-your-creativity-while-working-from-home/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/38753003fe9b65bb2ccf761e6e3034a2/58556/work-from-home-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Working from home has its pros and cons. You can enjoy quality time with your family, save on travel expenses, and focus more on your kids. On the other hand, you might get bored after a while, miss those chats with your colleagues near the cooler, or yearn to go outside and breathe in fresh air. Here are some tips you can try to enhance your creativity while working from home. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/top-10-tips-to-enhance-your-creativity-while-working-from-home/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[A Detail Guide to Consent Management and Processing Data]]></title><description><![CDATA[The importance of consent management cannot be understated. Whether you are a small business that is starting out or a multinational brand, consent management is going to be a crucial piece of your organization's ability to grow sustainably while building trust within your consumer base. Learn how the GDPR and CCPA define conditions that allow user data to be processed without consent or unconditionally.]]></description><link>https://www.loginradius.com/blog/identity/guide-consent-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/guide-consent-management/</guid><category><![CDATA[consent management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Abhilash Menon]]></dc:creator><pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/de8f04f2edf01541ff6b545d26ab4c0f/58556/guide-consent-management-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The importance of consent management cannot be understated. Whether you are a small business that is starting out or a multinational brand, consent management is going to be a crucial piece of your organization&apos;s ability to grow sustainably while building trust within your consumer base. Learn how the GDPR and CCPA define conditions that allow user data to be processed without consent or unconditionally. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/guide-consent-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Abhilash Menon&amp;size=100</authorImage></item><item><title><![CDATA[Workflow Automation- What is it and Why Do You Need It?]]></title><description><![CDATA[Workflow automation refers to the process of automating a set of manual processes or tasks based on a set of pre-defined rules or conditions. It helps you reduce the use of resources and time, more importantly, the chances of human-made errors. As a result, it improves a business’s overall efficiency, audibility, and accountability.]]></description><link>https://www.loginradius.com/blog/identity/what-is-workflow-automation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-workflow-automation/</guid><category><![CDATA[workflow automation]]></category><category><![CDATA[scalability]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0b5889aaa33e2e4500707b3e8c4f0e20/58556/what-is-workflow-automation-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Workflow automation refers to the process of automating a set of manual processes or tasks based on a set of pre-defined rules or conditions. It helps you reduce the use of resources and time, more importantly, the chances of human-made errors. As a result, it improves a business’s overall efficiency, audibility, and accountability. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-workflow-automation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How Git Local Repository Works]]></title><description><![CDATA[In this article, I will talk about how Git Local Repository Works]]></description><link>https://www.loginradius.com/blog/engineering/how-git-local-repository-works/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-git-local-repository-works/</guid><category><![CDATA[GIT]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Mon, 12 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4fd42535cde3fddc0451ae0d89c15a26/58556/git.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, I will talk about how Git Local Repository Works &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-git-local-repository-works/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Does Your Site’s Imagery Reflect Your Brand Identity]]></title><description><![CDATA[The visuals on your website, in any form, represent your brand identity in a way that conveys a strong message resulting in building assurance and reliability over time.  Read on to learn the basics of a website’s imagery that impacts your marketing and how to craft an appealing experience for your site visitors.]]></description><link>https://www.loginradius.com/blog/growth/does-your-website-imagery-reflect-your-brand-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/does-your-website-imagery-reflect-your-brand-identity/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Fri, 09 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56e86f193fda6dea0cfe2a77ebf841db/58556/website-branding-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The visuals on your website, in any form, represent your brand identity in a way that conveys a strong message resulting in building assurance and reliability over time.  Read on to learn the basics of a website’s imagery that impacts your marketing and how to craft an appealing experience for your site visitors. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/does-your-website-imagery-reflect-your-brand-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[How Companies can Enable Account security for their Consumers]]></title><description><![CDATA[The increasing concern for security makes it important for all businesses to know how to protect consumer privacy. As technology advances rapidly, businesses should keep track of the emerging cybersecurity trends and upgrade their data security systems accordingly. Here are the enterprise best practices to enable account security for consumers.]]></description><link>https://www.loginradius.com/blog/identity/account-security-consumers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/account-security-consumers/</guid><category><![CDATA[Security]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 09 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ebbe73d029e7d05e4e496bb1cd4a61f1/58556/account-security-consumers-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The increasing concern for security makes it important for all businesses to know how to protect consumer privacy. As technology advances rapidly, businesses should keep track of the emerging cybersecurity trends and upgrade their data security systems accordingly. Here are the enterprise best practices to enable account security for consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/account-security-consumers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[What is Progressive Profiling and How it Works?]]></title><description><![CDATA[Progressive profiling is emerging as an effective way of cementing the trust gap between the company and its consumers. It is a systematic approach to collecting critical information through smart forms that ask questions intended to guide prospective consumers across the sales funnel. This article details how progressive profiling works and its benefits for your enterprise.]]></description><link>https://www.loginradius.com/blog/identity/progressive-profiling/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/progressive-profiling/</guid><category><![CDATA[progressive profiling]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Shachindra Saxena]]></dc:creator><pubDate>Thu, 08 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b34127509a6941123fc74fe4afc16e38/58556/progressive-profiling-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Progressive profiling is emerging as an effective way of cementing the trust gap between the company and its consumers. It is a systematic approach to collecting critical information through smart forms that ask questions intended to guide prospective consumers across the sales funnel. This article details how progressive profiling works and its benefits for your enterprise. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/progressive-profiling/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shachindra Saxena&amp;size=100</authorImage></item><item><title><![CDATA[Password Spraying: What Is It And How To Prevent It?]]></title><description><![CDATA[Password spraying is not a targeted attack, it is just one malicious actor acquiring a list of email accounts or gaining access to an active directory and attempting to sign in to all the accounts using a list of the most likely, popular, or common passwords until they get a hit. In this article, we detail what is password spraying, how to not be vulnerable to password spraying.]]></description><link>https://www.loginradius.com/blog/identity/password-spraying/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/password-spraying/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[password management]]></category><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 07 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e860a722cf6ce888c38f6085226f8048/7f8e9/password-spraying.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Password spraying is not a targeted attack, it is just one malicious actor acquiring a list of email accounts or gaining access to an active directory and attempting to sign in to all the accounts using a list of the most likely, popular, or common passwords until they get a hit. In this article, we detail what is password spraying, how to not be vulnerable to password spraying. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/password-spraying/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[5 Tips to Prevent OAuth Authentication Vulnerabilities]]></title><description><![CDATA[The most common mistake for any business that usually goes unnoticed is the poor implementation of OAuth, which is an open standard for token-based authentication & authorization. Here’s an insightful read that highlights the major OAuth implementation vulnerabilities and tips to avoid them for maximum security.]]></description><link>https://www.loginradius.com/blog/identity/oauth-authentication-vulnerabilities/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/oauth-authentication-vulnerabilities/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Thu, 01 Apr 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5e41c8817c91f4693bc74c15b410057c/58556/OAuth-authentication-vulnerabilities-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The most common mistake for any business that usually goes unnoticed is the poor implementation of OAuth, which is an open standard for token-based authentication &amp; authorization. Here’s an insightful read that highlights the major OAuth implementation vulnerabilities and tips to avoid them for maximum security. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/oauth-authentication-vulnerabilities/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[B2B Lead Generation for 2021: 11 Proven Strategies]]></title><description><![CDATA[Whether it is B2C or B2B lead generation, anyone interested in what you have to offer becomes part of the target audience. However, there are a few differences between B2B and B2C lead generation, especially in terms of the approach and buying process. In this article, we take a closer look at what exactly B2B lead generation is and tips for 2021.]]></description><link>https://www.loginradius.com/blog/growth/b2b-lead-generation-for-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/b2b-lead-generation-for-2021/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5ec9c103f62f7f083c602410c03fe547/58556/B2B-marketing-strategies-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Whether it is B2C or B2B lead generation, anyone interested in what you have to offer becomes part of the target audience. However, there are a few differences between B2B and B2C lead generation, especially in terms of the approach and buying process. In this article, we take a closer look at what exactly B2B lead generation is and tips for 2021. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/b2b-lead-generation-for-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[How to Boost Your B2B Marketing Strategy with Hyper-Personalization]]></title><description><![CDATA[Hyper-personalization helps to deliver more relevant and highly-personalized content by leveraging artificial intelligence coupled with real-time data. With consumers demanding a brand to deliver them a personalized experience, hyper-personalization is the key to success for an online business.]]></description><link>https://www.loginradius.com/blog/growth/how-to-boost-your-b2b-marketing-strategy-with-hyper-personalization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-boost-your-b2b-marketing-strategy-with-hyper-personalization/</guid><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2b740665925baa8f0922087f7c0640c9/58556/Effective-Communication-Strategies.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hyper-personalization helps to deliver more relevant and highly-personalized content by leveraging artificial intelligence coupled with real-time data. With consumers demanding a brand to deliver them a personalized experience, hyper-personalization is the key to success for an online business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-boost-your-b2b-marketing-strategy-with-hyper-personalization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Inbound Vs Outbound: Which Marketing Strategy is Best for You]]></title><description><![CDATA[Inbound marketing and outbound marketing are the two most important strategies in today's marketing strategy. Many companies employ both in accordance with their requirements. Let’s take a closer look at inbound vs. outbound marketing to understand which approach best suits your business.]]></description><link>https://www.loginradius.com/blog/growth/which-marketing-strategy-is-best-for-you/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/which-marketing-strategy-is-best-for-you/</guid><dc:creator><![CDATA[Shachindra Saxena]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c8bb00ae1327fb06f0754d0433d8a4d1/58556/marketing-plan.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Inbound marketing and outbound marketing are the two most important strategies in today&apos;s marketing strategy. Many companies employ both in accordance with their requirements. Let’s take a closer look at inbound vs. outbound marketing to understand which approach best suits your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/which-marketing-strategy-is-best-for-you/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shachindra Saxena&amp;size=100</authorImage></item><item><title><![CDATA[Steps to Grow Your Emotional Intelligence for Better Consumer Relations]]></title><description><![CDATA[Steps to Grow Your Emotional Intelligence for Better Consumer Relations | LoginRadius.]]></description><link>https://www.loginradius.com/blog/growth/emotional-intelligence/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/emotional-intelligence/</guid><dc:creator><![CDATA[Lesley Vos]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7910f1467d872f12ac5964d68fa3eae5/58556/emotional-intelligence-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Steps to Grow Your Emotional Intelligence for Better Consumer Relations | LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/emotional-intelligence/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lesley Vos&amp;size=100</authorImage></item><item><title><![CDATA[Calculating ROI, Build vs Buy (Part 1)]]></title><description><![CDATA[Most businesses with legacy systems are stuck between choosing to maintain an existing in-house system, investing in building a new in-house system, or working with a vendor. Making the wrong decision can be expensive. This blog is a multi-part series where we have outlined the value of working with LoginRadius over maintaining and building up your existing systems.]]></description><link>https://www.loginradius.com/blog/identity/calcualting-roi-build-vs-buy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/calcualting-roi-build-vs-buy/</guid><category><![CDATA[customer authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Cooper Matheson]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9e5c3a436646fe5c91d9c5d3189df768/58556/calcualting-roi-build-vs-buy-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Most businesses with legacy systems are stuck between choosing to maintain an existing in-house system, investing in building a new in-house system, or working with a vendor. Making the wrong decision can be expensive. This blog is a multi-part series where we have outlined the value of working with LoginRadius over maintaining and building up your existing systems. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/calcualting-roi-build-vs-buy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Cooper Matheson&amp;size=100</authorImage></item><item><title><![CDATA[Identity Theft Frauds- Staying Ahead in 2021]]></title><description><![CDATA[With so many businesses adopting diverse working environments, fraudsters are quickly finding new ways to breach security and gain access to confidential information. Businesses must anticipate potential frauds to minimize the risk for their employees’ and clients’ identities in 2021.]]></description><link>https://www.loginradius.com/blog/identity/identity-theft-frauds/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-theft-frauds/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/324c0ac5528e5372fb06f2260e91ec50/58556/identity-theft-fraud-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With so many businesses adopting diverse working environments, fraudsters are quickly finding new ways to breach security and gain access to confidential information. Businesses must anticipate potential frauds to minimize the risk for their employees’ and clients’ identities in 2021. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-theft-frauds/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[What is privacy compliance and why is it so important?]]></title><description><![CDATA[Privacy compliance is the line between the legal and the illegal. Such regulations help protect consumers in different countries by ensuring data is handled appropriately. Another reason why organizations must comply is to avoid heavy fines.]]></description><link>https://www.loginradius.com/blog/identity/privacy-compliance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/privacy-compliance/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vishal Sharma]]></dc:creator><pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9771c8c5f3e6fc8d3e2350ffc8351a28/58556/privacy-compliance-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Privacy compliance is the line between the legal and the illegal. Such regulations help protect consumers in different countries by ensuring data is handled appropriately. Another reason why organizations must comply is to avoid heavy fines. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/privacy-compliance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vishal Sharma&amp;size=100</authorImage></item><item><title><![CDATA[7 Best Marketing Emails to Attract Consumers Right Away]]></title><description><![CDATA[Even in this day and age of social media marketing, email marketing remains among the best marketing tools to attract and grow your customer base. This article outlines the seven most effective types of marketing emails that your sales prospects would love to see in their mailbox.]]></description><link>https://www.loginradius.com/blog/growth/7-best-marketing-emails-to-attract-consumers-right-away/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/7-best-marketing-emails-to-attract-consumers-right-away/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Tue, 30 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/41b30a405bc58c400eef343585930071/58556/email-business-Loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Even in this day and age of social media marketing, email marketing remains among the best marketing tools to attract and grow your customer base. This article outlines the seven most effective types of marketing emails that your sales prospects would love to see in their mailbox. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/7-best-marketing-emails-to-attract-consumers-right-away/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Growth Hacking: What it is and How SaaS Businesses Can Use it to Optimize Growth]]></title><description><![CDATA[Growth hacking has become an essential factor in a start-up or business marketing to ensure that it can kick start earning revenue. However, the question lies in how to begin. The very first step that you need to take is to study your target consumer.]]></description><link>https://www.loginradius.com/blog/growth/understanding-growth-hacking-and-how-saas-businesses-can-use-it-to-optimize-growth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/understanding-growth-hacking-and-how-saas-businesses-can-use-it-to-optimize-growth/</guid><dc:creator><![CDATA[Shachindra Saxena]]></dc:creator><pubDate>Tue, 30 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/91be7f0557cfc9e433916d41178bfea8/58556/growth-hacking-2-colorized.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Growth hacking has become an essential factor in a start-up or business marketing to ensure that it can kick start earning revenue. However, the question lies in how to begin. The very first step that you need to take is to study your target consumer. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/understanding-growth-hacking-and-how-saas-businesses-can-use-it-to-optimize-growth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shachindra Saxena&amp;size=100</authorImage></item><item><title><![CDATA[What is Authentication? Definition and How It Works]]></title><description><![CDATA[Authentication is the digital gatekeeper that verifies identity—from unlocking smartphones to accessing enterprise cloud applications. But authentication goes beyond passwords; it's about protecting digital identities and ensuring only authorized access to data and systems. In this guide, we'll break down authentication's fundamentals, explore various methods, and highlight how innovative businesses implement modern protocols to stay secure.]]></description><link>https://www.loginradius.com/blog/identity/what-is-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-authentication/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Data Security]]></category><category><![CDATA[MFA]]></category><category><![CDATA[Identity Management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 29 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/66f15040f1737eb4f2afc37b7324d3e4/58556/what-is-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication is the digital gatekeeper that verifies identity—from unlocking smartphones to accessing enterprise cloud applications. But authentication goes beyond passwords; it&apos;s about protecting digital identities and ensuring only authorized access to data and systems. In this guide, we&apos;ll break down authentication&apos;s fundamentals, explore various methods, and highlight how innovative businesses implement modern protocols to stay secure. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>12</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to add SSO for your WordPress Site!]]></title><description><![CDATA[Providing a seamless experience for your consumers is non-negotiable, especially when running multiple WordPress sites. Single Sign-On provides that experience to your users. Here's how to provide a frictionless experience to your users.]]></description><link>https://www.loginradius.com/blog/engineering/sso-for-wordpress-site/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/sso-for-wordpress-site/</guid><category><![CDATA[WordPress]]></category><category><![CDATA[SSO]]></category><category><![CDATA[Single Sign On]]></category><dc:creator><![CDATA[Saikiran Babladi]]></dc:creator><pubDate>Fri, 26 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80a0f6467eb572b36b2c595b1cc907f7/7f8e9/sso-wp.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Providing a seamless experience for your consumers is non-negotiable, especially when running multiple WordPress sites. Single Sign-On provides that experience to your users. Here&apos;s how to provide a frictionless experience to your users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/sso-for-wordpress-site/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Saikiran Babladi&amp;size=100</authorImage></item><item><title><![CDATA[What are Federated Identity Providers?]]></title><description><![CDATA[Federated identity management is a configuration that can be made between two or more trusted domains to allow consumers of those domains to access applications and services using the same digital identity. Such identity is known as federated identity, and the use of such a solution pattern is known as identity federation.]]></description><link>https://www.loginradius.com/blog/identity/federated-identity-providers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/federated-identity-providers/</guid><category><![CDATA[federated identity management]]></category><category><![CDATA[saml]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Fri, 26 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5e9da933664ec08fdd00eeacfba77a4e/7f8e9/federated-identity-providers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Federated identity management is a configuration that can be made between two or more trusted domains to allow consumers of those domains to access applications and services using the same digital identity. Such identity is known as federated identity, and the use of such a solution pattern is known as identity federation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/federated-identity-providers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Login with Google Apps]]></title><description><![CDATA[Do you have a successful solo business? Or do you have a team of 200 people working for you? You may want to set up the G Suite to improve your efficiency. Google apps have become the industry standard for in-house workflow, making the lives of working individuals easier and less stressful.]]></description><link>https://www.loginradius.com/blog/identity/login-with-google-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/login-with-google-apps/</guid><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Keshav Kumar]]></dc:creator><pubDate>Fri, 26 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/09bca5d162709d3d441640d8544307ee/d356d/google-apps-cover-pic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Do you have a successful solo business? Or do you have a team of 200 people working for you? You may want to set up the G Suite to improve your efficiency. Google apps have become the industry standard for in-house workflow, making the lives of working individuals easier and less stressful. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/login-with-google-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Keshav Kumar&amp;size=100</authorImage></item><item><title><![CDATA[What is Passwordless Login?]]></title><description><![CDATA[Can you exactly recall which accounts what passwords belong to? How frequently do you reuse the same password because you can't have a unique, strong, and easily-remembered password for each of your accounts? Passwordless Login takes the frustration out of the equation to create a better consumer experience.]]></description><link>https://www.loginradius.com/blog/identity/what-is-passwordless-login/index/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-passwordless-login/index/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[authentication]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Keshav Kumar]]></dc:creator><pubDate>Fri, 26 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fed439cfe626a2ff5cd2e2cafddbbf33/7f8e9/what-is-passwordless-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Can you exactly recall which accounts what passwords belong to? How frequently do you reuse the same password because you can&apos;t have a unique, strong, and easily-remembered password for each of your accounts? Passwordless Login takes the frustration out of the equation to create a better consumer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-passwordless-login/index/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Keshav Kumar&amp;size=100</authorImage></item><item><title><![CDATA[What is Standard Login]]></title><description><![CDATA[Standard Login is an essential aspect of website authentication. With a better security perspective, your organization can look into more robust registration and login processes that move beyond the traditional offerings. That's why we've created this guide.]]></description><link>https://www.loginradius.com/blog/identity/what-is-standard-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-standard-login/</guid><category><![CDATA[login]]></category><category><![CDATA[user authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Keshav Kumar]]></dc:creator><pubDate>Fri, 26 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f3d21ae2074dfdfd7c0f83d0e931694d/1d747/standard_login_cover_pic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Standard Login is an essential aspect of website authentication. With a better security perspective, your organization can look into more robust registration and login processes that move beyond the traditional offerings. That&apos;s why we&apos;ve created this guide. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-standard-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Keshav Kumar&amp;size=100</authorImage></item><item><title><![CDATA[Thinking Beyond the Pandemic: How to Make Marketing Plans After Coronavirus]]></title><description><![CDATA[B2B marketing post-COVID focuses more on the digitization of businesses where consumers are now reached via web articles, digital ads, emails, videos, and virtual presentations. There is much emphasis on fostering better connections, and delivering relevant content to build long-term relationships.]]></description><link>https://www.loginradius.com/blog/growth/how-to-make-businesses-marketing-plans-after-coronavirus/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-make-businesses-marketing-plans-after-coronavirus/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 25 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/30163b26c7e0184441ac5930c9227515/58556/business-after-covid-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; B2B marketing post-COVID focuses more on the digitization of businesses where consumers are now reached via web articles, digital ads, emails, videos, and virtual presentations. There is much emphasis on fostering better connections, and delivering relevant content to build long-term relationships. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-make-businesses-marketing-plans-after-coronavirus/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Guide to Authorization Code Flow for OAuth 2.0]]></title><description><![CDATA[This article will help you to understand the OAuth 2.0 authorization code flow.]]></description><link>https://www.loginradius.com/blog/engineering/authorization-code-flow-oauth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/authorization-code-flow-oauth/</guid><category><![CDATA[Oauth]]></category><category><![CDATA[Authorization Code Flow]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/18d405bfac70941af3b7962d3d79073c/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article will help you to understand the OAuth 2.0 authorization code flow. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/authorization-code-flow-oauth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[8 Effective Communication Strategies for Internal Alignment and Growth in 2021]]></title><description><![CDATA[Internal communication can be defined as the key to delivering excellent customer and employee experiences. Besides the broader day-to-day function of facilitating employee interaction, internal communication strategies also involve employing a standard, agreed-upon style and mode of language about a company and its products communicated to the outside world.]]></description><link>https://www.loginradius.com/blog/growth/8-effective-communication-strategies-for-internal-alignment-and-growth-in-2021/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/8-effective-communication-strategies-for-internal-alignment-and-growth-in-2021/</guid><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b22d40cccc6842c508d9b2be59f12e02/58556/communication-strategies-Loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Internal communication can be defined as the key to delivering excellent customer and employee experiences. Besides the broader day-to-day function of facilitating employee interaction, internal communication strategies also involve employing a standard, agreed-upon style and mode of language about a company and its products communicated to the outside world. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/8-effective-communication-strategies-for-internal-alignment-and-growth-in-2021/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[IoT authentication in the airline industry]]></title><description><![CDATA[The best aspect of IoT authentication in the airline industry or the general use of IoT is the convenience that it brings. It can ease the anxiety of a passenger as they receive reassurance that their data will not see the light of day. In addition, it ensures the required protective measures on the cybersecurity front.]]></description><link>https://www.loginradius.com/blog/identity/iot-authentication-airlines/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/iot-authentication-airlines/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5dcee62fcefeddc62c8938edb4e6cdda/58556/iot-authentication-airlines-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The best aspect of IoT authentication in the airline industry or the general use of IoT is the convenience that it brings. It can ease the anxiety of a passenger as they receive reassurance that their data will not see the light of day. In addition, it ensures the required protective measures on the cybersecurity front. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/iot-authentication-airlines/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Drive in the Highest Quality Leads in 2021 with Content and SEO]]></title><description><![CDATA[When it comes to digital marketing, SEO and lead generation techniques go hand in hand. As long as your content is SEO-friendly, you are bound to generate leads in one way or the other. The basic step to follow is to create high-quality content paired with the right SEO practices to generate leads for your business in no time.]]></description><link>https://www.loginradius.com/blog/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/</guid><dc:creator><![CDATA[Deependra Singh]]></dc:creator><pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ecd5821c66f50e6ddef8637d476e0063/58556/content-marketing-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When it comes to digital marketing, SEO and lead generation techniques go hand in hand. As long as your content is SEO-friendly, you are bound to generate leads in one way or the other. The basic step to follow is to create high-quality content paired with the right SEO practices to generate leads for your business in no time. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deependra Singh&amp;size=100</authorImage></item><item><title><![CDATA[Single Sign-On- A Beginner’s Guide]]></title><description><![CDATA[The beauty of single sign-on lies in its simplicity. The feature authenticates you on a one-on-one designated platform, allowing you to utilize tons of available services without having to login and logout every time. Consumers can think of this as similar to the social sign-in via Google, Facebook, Twitter, etc.]]></description><link>https://www.loginradius.com/blog/identity/single-sign-on-a-beginners-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/single-sign-on-a-beginners-guide/</guid><category><![CDATA[single sign on]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Ashish Kumar Yadav]]></dc:creator><pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5a63b7b5098d9a2c637d90cb64306797/58556/sso-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The beauty of single sign-on lies in its simplicity. The feature authenticates you on a one-on-one designated platform, allowing you to utilize tons of available services without having to login and logout every time. Consumers can think of this as similar to the social sign-in via Google, Facebook, Twitter, etc. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/single-sign-on-a-beginners-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashish Kumar Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Multi-Factor Authentication - A Beginner’s Guide]]></title><description><![CDATA[MFA or multi-factor authentication is a feature widely used by businesses to ensure that the consumers coming on their website are actually who they say they are. There are multiple ways to implement multifactor authentication. We will get to them one by one in this blog.]]></description><link>https://www.loginradius.com/blog/identity/multi-factor-authentication-a-beginners-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/multi-factor-authentication-a-beginners-guide/</guid><category><![CDATA[mfa]]></category><category><![CDATA[password security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Ashish Kumar Yadav]]></dc:creator><pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6880cf497ea4b7ea401d558b6a5a63cf/58556/MFA-Loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; MFA or multi-factor authentication is a feature widely used by businesses to ensure that the consumers coming on their website are actually who they say they are. There are multiple ways to implement multifactor authentication. We will get to them one by one in this blog. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/multi-factor-authentication-a-beginners-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashish Kumar Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Announcement - Authentication API Analytics to Evaluate the Performance of LoginRadius APIs for Your Applications]]></title><description><![CDATA[Recently, LoginRadius launched Authentication API Analytics to provide an analytics report to businesses and their developers for requests made to different LoginRadius APIs. The feature contains useful charts and analytic tools to view and measure an application's overall performance (where using LoginRadius).]]></description><link>https://www.loginradius.com/blog/identity/api-authentication-analytics/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/api-authentication-analytics/</guid><category><![CDATA[authentication]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/19b51ccd642ecdf24f0bf2bb40726dc6/c0524/api-authentication-analytics-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Recently, LoginRadius launched Authentication API Analytics to provide an analytics report to businesses and their developers for requests made to different LoginRadius APIs. The feature contains useful charts and analytic tools to view and measure an application&apos;s overall performance (where using LoginRadius). &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/api-authentication-analytics/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[20 Content Ideas for Most Engaging B2B LinkedIn Posts]]></title><description><![CDATA[Content on LinkedIn makes all the difference to the promotion of a brand. It can make or break one's presence on LinkedIn. Therefore, it is essential to figure out the tone of LinkedIn posts, depending on the target demographic.]]></description><link>https://www.loginradius.com/blog/growth/20-content-ideas-for-most-engaging-b2b-linkedin-posts/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/20-content-ideas-for-most-engaging-b2b-linkedin-posts/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Fri, 19 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/70a5d4f0ce2e13eb8e7375e0256e38d2/58556/linkedin-post-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Content on LinkedIn makes all the difference to the promotion of a brand. It can make or break one&apos;s presence on LinkedIn. Therefore, it is essential to figure out the tone of LinkedIn posts, depending on the target demographic. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/20-content-ideas-for-most-engaging-b2b-linkedin-posts/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Top 10 Cybersecurity Predictions for 2021 That SMBs Must Know]]></title><description><![CDATA[Targeted phishing attacks are one of the leading cybersecurity threats that SMBs should prepare to encounter this year. Also, data breaches in the healthcare sector peaked in 2020 and are expected to continue in the future.]]></description><link>https://www.loginradius.com/blog/identity/top-10-cybersecurity-predictions-for-2021-that-smbs-must-know/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/top-10-cybersecurity-predictions-for-2021-that-smbs-must-know/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 19 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/026be97d5db92dec2b9c7c9412576cc6/58556/cybersecurity-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Targeted phishing attacks are one of the leading cybersecurity threats that SMBs should prepare to encounter this year. Also, data breaches in the healthcare sector peaked in 2020 and are expected to continue in the future. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/top-10-cybersecurity-predictions-for-2021-that-smbs-must-know/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why is Consumer Onboarding Critical for Startups]]></title><description><![CDATA[consumer Onboarding is a process that involves all aspects of introducing a new consumer to your organization's products and services. Its purpose is to make sure that your consumer is well trained on how to use your product and get the most out of it.]]></description><link>https://www.loginradius.com/blog/growth/why-is-consumer-onboarding-critical-for-startups/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/why-is-consumer-onboarding-critical-for-startups/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 18 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7ce754d03c4d2d0983c6098208779486/58556/client-onboard-loginradius-fuel-blog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; consumer Onboarding is a process that involves all aspects of introducing a new consumer to your organization&apos;s products and services. Its purpose is to make sure that your consumer is well trained on how to use your product and get the most out of it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/why-is-consumer-onboarding-critical-for-startups/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Put Yourself In Control of Your Data by Leveraging LoginRadius' SSO]]></title><description><![CDATA[An SSO strategy tailor-made as per the company’s needs can be a massive boost to the pace of business operations, as several security processes are streamlined. Data vulnerabilities are fortified, and the overall consumer experience is improved as inefficiencies in the system are ironed out.]]></description><link>https://www.loginradius.com/blog/identity/put-yourself-in-control-of-your-data-by-leveraging-loginradius-sso/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/put-yourself-in-control-of-your-data-by-leveraging-loginradius-sso/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 18 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/af824905b36cba64423392ab6b980015/58556/sso-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; An SSO strategy tailor-made as per the company’s needs can be a massive boost to the pace of business operations, as several security processes are streamlined. Data vulnerabilities are fortified, and the overall consumer experience is improved as inefficiencies in the system are ironed out. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/put-yourself-in-control-of-your-data-by-leveraging-loginradius-sso/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What Is User Management?]]></title><description><![CDATA[Though user management has been around for a long time now, especially within the IAM and ITAM space, it has assumed new importance with introducing cloud-based subscriptions. Recent trends show that there is a sure shift to cloud-based IAM, granting administrators greater access and control over digital assets management.]]></description><link>https://www.loginradius.com/blog/identity/what-is-user-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-user-management/</guid><category><![CDATA[user management]]></category><category><![CDATA[identity access management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 16 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/593fab361542ba8591680c41517a3b71/7f8e9/user-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Though user management has been around for a long time now, especially within the IAM and ITAM space, it has assumed new importance with introducing cloud-based subscriptions. Recent trends show that there is a sure shift to cloud-based IAM, granting administrators greater access and control over digital assets management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-user-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to UniFi Ubiquiti Network]]></title><description><![CDATA[Getting started with Unifi Network for getting the freedom of remote management of network devices. Here's what you need to know about UniFi network.]]></description><link>https://www.loginradius.com/blog/engineering/introduction-to-unifi-ubiquiti-network/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-to-unifi-ubiquiti-network/</guid><category><![CDATA[Network]]></category><category><![CDATA[Unifi Networking]]></category><category><![CDATA[Remote Team Management]]></category><category><![CDATA[Startups Solutions]]></category><dc:creator><![CDATA[Roshan Jangid]]></dc:creator><pubDate>Mon, 15 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Getting started with Unifi Network for getting the freedom of remote management of network devices. Here&apos;s what you need to know about UniFi network. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-to-unifi-ubiquiti-network/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/roshan-jangid.png?size=100v=40</authorImage></item><item><title><![CDATA[How Customer Retention Can Help Businesses Grow]]></title><description><![CDATA[ Customer retention can be seen as a company's ability to maintain its existing customers by establishing strong relationships with them. Today, more people are planning to invest in start-ups, making it necessary for entrepreneurs to improve customer retention as a top-most goal.]]></description><link>https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/</guid><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Mon, 15 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/689e783d29c64db86fc5d9b439bdf7c0/58556/customer-retention-LoginRadius-colorized.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Customer retention can be seen as a company&apos;s ability to maintain its existing customers by establishing strong relationships with them. Today, more people are planning to invest in start-ups, making it necessary for entrepreneurs to improve customer retention as a top-most goal. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[The Upcoming Future of Software Testers and SDETs in 2021]]></title><description><![CDATA[A brief overview about the upcoming future of software testers and SDETs and the requirement of SDET role and responsibility in 2021.]]></description><link>https://www.loginradius.com/blog/engineering/software-development-engineer-in-test/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/software-development-engineer-in-test/</guid><category><![CDATA[SDET]]></category><category><![CDATA[SDET vs Automation Engineer]]></category><dc:creator><![CDATA[Rakesh Pareek]]></dc:creator><pubDate>Fri, 12 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/efd3a736529d9ff3983544af7ed77c7e/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A brief overview about the upcoming future of software testers and SDETs and the requirement of SDET role and responsibility in 2021. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/software-development-engineer-in-test/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/rkpareek.png?size=100v=40</authorImage></item><item><title><![CDATA[Why You Need an Effective Cloud Management Platform]]></title><description><![CDATA[Cloud management platforms are an integral part of managing cloud resources and infrastructure. They are a real asset, especially for a modern and remote workforce. Here’s how they help in business operations.]]></description><link>https://www.loginradius.com/blog/engineering/effective-cloud-management-platform/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/effective-cloud-management-platform/</guid><category><![CDATA[Cloud]]></category><category><![CDATA[Cloud Management]]></category><dc:creator><![CDATA[Aayushi Sanghavi]]></dc:creator><pubDate>Wed, 10 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7b9ebd4eb272d99fb0d02d48dbb4ebb0/a3e81/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cloud management platforms are an integral part of managing cloud resources and infrastructure. They are a real asset, especially for a modern and remote workforce. Here’s how they help in business operations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/effective-cloud-management-platform/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Aayushi Sanghavi&amp;size=100</authorImage></item><item><title><![CDATA[What is Adaptive Authentication or Risk-based Authentication?]]></title><description><![CDATA[Adaptive Authentication intelligently identifies malicious attempt based on the defined risk factors and prompt the consumers to complete an additional step to verify their identities]]></description><link>https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/</guid><category><![CDATA[Adaptive Authentication]]></category><category><![CDATA[Risk-based Authentication]]></category><dc:creator><![CDATA[Jitender Agarwal]]></dc:creator><pubDate>Tue, 09 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c3ea768927bb2fea7249500bd3254e01/58556/adaptive-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Adaptive Authentication intelligently identifies malicious attempt based on the defined risk factors and prompt the consumers to complete an additional step to verify their identities &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jitender Agarwal&amp;size=100</authorImage></item><item><title><![CDATA[How CIAM Will Address The 5 Most Popular Issues In The Utility Industry]]></title><description><![CDATA[A lot of utility companies require a good customer retention percentage—since the nature of their business is recurring and net revenue is dependent on how many times a consumer has used the service. Therefore, to retain consumers, it is vital to understand their needs.]]></description><link>https://www.loginradius.com/blog/identity/ciam-addresses-utility-issues/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ciam-addresses-utility-issues/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 09 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/daa7e388cf6169ff84d8b17d89d60332/7f8e9/ciam-utility.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A lot of utility companies require a good customer retention percentage—since the nature of their business is recurring and net revenue is dependent on how many times a consumer has used the service. Therefore, to retain consumers, it is vital to understand their needs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ciam-addresses-utility-issues/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 9 Challenges Faced by Every QA]]></title><description><![CDATA[Software testing is a difficult task in and of itself. Top 9 QA challenges that any tester in the software testing industry would face are discussed in clear terms here.]]></description><link>https://www.loginradius.com/blog/engineering/challenges-faced-by-qa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/challenges-faced-by-qa/</guid><category><![CDATA[QA]]></category><category><![CDATA[Processes]]></category><category><![CDATA[Testing]]></category><dc:creator><![CDATA[Neha Vyas]]></dc:creator><pubDate>Fri, 05 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3cb5bace33cd7de67d48a1447d9512a7/58556/testing-challenges.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Software testing is a difficult task in and of itself. Top 9 QA challenges that any tester in the software testing industry would face are discussed in clear terms here. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/challenges-faced-by-qa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/nehavyasqa.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 4 Serverless Computing Platforms in 2021]]></title><description><![CDATA[Traditional software development is being transformed by serverless computing. Check out the best serveless computing platforms that will assist you in getting started.]]></description><link>https://www.loginradius.com/blog/engineering/serverless-overview/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/serverless-overview/</guid><category><![CDATA[Serverless]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Thu, 04 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d0f5b94c5c84661a08014e68b645384c/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Traditional software development is being transformed by serverless computing. Check out the best serveless computing platforms that will assist you in getting started. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/serverless-overview/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[CIAM Continues to Draw Attention as Okta acquires Auth0]]></title><description><![CDATA[Okta, a workforce identity provider, broke the news yesterday that it is buying its smaller rival Auth0 in a $6.5 billion all-stock deal—one of the blockbuster acquisition news in IAM space.]]></description><link>https://www.loginradius.com/blog/identity/okta-acquires-auth0/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/okta-acquires-auth0/</guid><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 04 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9ba0a1dc94fe524d0ff0fcb19d33e694/3b245/loginradius-blog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Okta, a workforce identity provider, broke the news yesterday that it is buying its smaller rival Auth0 in a $6.5 billion all-stock deal—one of the blockbuster acquisition news in IAM space. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/okta-acquires-auth0/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Protecting a Unified Cloud Platform through Cloud Security Management]]></title><description><![CDATA[Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well.]]></description><link>https://www.loginradius.com/blog/identity/cloud-security-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cloud-security-management/</guid><category><![CDATA[cloud security]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 03 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/634596c333abfd4b35e4c1b5fcb5004a/58556/cloud-security-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cloud-security-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Continuous Authentication]]></title><description><![CDATA[Continuous authentication estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new and has brought a novel perspective to network protection these days.]]></description><link>https://www.loginradius.com/blog/identity/continuous-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/continuous-authentication/</guid><category><![CDATA[continuous authentication]]></category><category><![CDATA[biometric authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 03 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f05c4cb061bc08bb480e3d77387f26e3/58556/continuous-authentication-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Continuous authentication estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new and has brought a novel perspective to network protection these days. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/continuous-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[QA Testing Process: How to Deliver Quality Software]]></title><description><![CDATA[A comprehensive overview of the QA testing process is given. Learn what it takes to get top-notch testing facilities.]]></description><link>https://www.loginradius.com/blog/engineering/qa-teams-deliver-quality-software/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/qa-teams-deliver-quality-software/</guid><category><![CDATA[QA]]></category><category><![CDATA[Processes]]></category><category><![CDATA[Testing]]></category><dc:creator><![CDATA[Neha Vyas]]></dc:creator><pubDate>Mon, 01 Mar 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/129a0973488f0d77139cfcb0f1cb61eb/ad85c/software-testing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A comprehensive overview of the QA testing process is given. Learn what it takes to get top-notch testing facilities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/qa-teams-deliver-quality-software/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/nehavyasqa.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Brute Force Attack]]></title><description><![CDATA[In brute force attacks, you are not exploiting any vulnerability in the web application. Instead, you are trying all the possible combinations and permutations of passwords and usernames of the victim and trying to see if you get any of those right.]]></description><link>https://www.loginradius.com/blog/identity/brute-force-lockout/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/brute-force-lockout/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Manish Tiwari]]></dc:creator><pubDate>Sat, 27 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fd2b4d51aee982f5439ba878189bfdc9/7f8e9/brute-force-lockout.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In brute force attacks, you are not exploiting any vulnerability in the web application. Instead, you are trying all the possible combinations and permutations of passwords and usernames of the victim and trying to see if you get any of those right. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/brute-force-lockout/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Manish Tiwari&amp;size=100</authorImage></item><item><title><![CDATA[What is PIN Authentication]]></title><description><![CDATA[Logging in through PIN is in popular culture nowadays. This feature allows the consumer to set a PIN in addition to the password during registration or login. Later, during the subsequent logins, the application requests the same PIN to authenticate.]]></description><link>https://www.loginradius.com/blog/identity/what-is-pin-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-pin-authentication/</guid><category><![CDATA[pin authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Abhishek Singh]]></dc:creator><pubDate>Sat, 27 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d58d32fda81c96a639d74accbeeca8cd/7f8e9/pin-authenticaton.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Logging in through PIN is in popular culture nowadays. This feature allows the consumer to set a PIN in addition to the password during registration or login. Later, during the subsequent logins, the application requests the same PIN to authenticate. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-pin-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Abhishek Singh&amp;size=100</authorImage></item><item><title><![CDATA[Why Is Customer Relationship Important for Every Business in 2021]]></title><description><![CDATA[Positive customer relations help you connect with your customers on a much more personal level. When you connect with the target audience deeply, you are much more likely to understand their requirements, resolve their problems, and create a sense of mutual understanding.]]></description><link>https://www.loginradius.com/blog/growth/customer-relationship-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-relationship-business/</guid><category><![CDATA[customer relation management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fa2d028545acc84acd1953fd95447044/58556/customer-relations-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Positive customer relations help you connect with your customers on a much more personal level. When you connect with the target audience deeply, you are much more likely to understand their requirements, resolve their problems, and create a sense of mutual understanding. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-relationship-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Customer Success: The Importance of Customer Onboarding]]></title><description><![CDATA[Customer onboarding is one of the more delicate components of marketing. This process can make or break a business. In addition to increasing the revenue, it also allows businesses to create relationships with their customers.]]></description><link>https://www.loginradius.com/blog/growth/importance-customer-onboarding/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/importance-customer-onboarding/</guid><category><![CDATA[customer onboarding]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/894e07d7ee34c1440609f49e2330888c/58556/customer-onboarding-importance.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customer onboarding is one of the more delicate components of marketing. This process can make or break a business. In addition to increasing the revenue, it also allows businesses to create relationships with their customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/importance-customer-onboarding/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[7 Tips and Tricks for B2B Consultant: How to Grow Your Client's Business]]></title><description><![CDATA[You are offering more than just a commodity as a B2B consultant. You sell strategies that can help business owners accomplish their goals. You need to conduct comprehensive research if you want to be successful in securing their business.]]></description><link>https://www.loginradius.com/blog/growth/tips-and-tricks-b2b-consultant/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/tips-and-tricks-b2b-consultant/</guid><dc:creator><![CDATA[Lidia Hovhannisyan]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bcb476052abf0b5ea6982c5862105a0e/58556/b2b-consultant.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; You are offering more than just a commodity as a B2B consultant. You sell strategies that can help business owners accomplish their goals. You need to conduct comprehensive research if you want to be successful in securing their business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/tips-and-tricks-b2b-consultant/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lidia Hovhannisyan&amp;size=100</authorImage></item><item><title><![CDATA[What is Risk-Based Authentication]]></title><description><![CDATA[RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that the access to a given system could result in it being compromised. As the level of risk increases, authentication becomes more restrictive.]]></description><link>https://www.loginradius.com/blog/identity/risk-based-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/risk-based-authentication/</guid><category><![CDATA[data security]]></category><category><![CDATA[risk based authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rajeev Sharma]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f17080a12c2cd6b1c187d7e566b13fe8/795c5/risk-based-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that the access to a given system could result in it being compromised. As the level of risk increases, authentication becomes more restrictive. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/risk-based-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rajeev Sharma&amp;size=100</authorImage></item><item><title><![CDATA[Understanding the Difference Between Single-Tenant and Multi-Tenant Cloud [Infographic]]]></title><description><![CDATA[A single-tenant cloud runs on dedicated infrastructure, while a multi-tenant cloud is a single cloud infrastructure built to serve multiple businesses. Check out the infographic by LoginRadius to understand the difference between the two and find out which is the right solution for your business.]]></description><link>https://www.loginradius.com/blog/identity/single-tenant-vs-multi-tenant/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/single-tenant-vs-multi-tenant/</guid><category><![CDATA[cloud computing]]></category><category><![CDATA[single tenant]]></category><category><![CDATA[multi tenant]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8c42e6b1a263259e38ee5b78afc285b2/58556/single-tenant-vs-multi-tenant-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A single-tenant cloud runs on dedicated infrastructure, while a multi-tenant cloud is a single cloud infrastructure built to serve multiple businesses. Check out the infographic by LoginRadius to understand the difference between the two and find out which is the right solution for your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/single-tenant-vs-multi-tenant/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Phone Login]]></title><description><![CDATA[Phone Login is a compelling and handy feature designed to enhance consumer experience and ease the process of login and registration. It eliminates the hassle of filling lengthy registration forms and creating new passwords and usernames, thereby allowing consumers to quickly login or register just by using their mobile phones.]]></description><link>https://www.loginradius.com/blog/identity/what-is-phone-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-phone-login/</guid><category><![CDATA[phone login]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Ashish Kumar Yadav]]></dc:creator><pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d26b5df225d96933799c9378128d393a/58556/PhoneLogin_cover_pic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Phone Login is a compelling and handy feature designed to enhance consumer experience and ease the process of login and registration. It eliminates the hassle of filling lengthy registration forms and creating new passwords and usernames, thereby allowing consumers to quickly login or register just by using their mobile phones. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-phone-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ashish Kumar Yadav&amp;size=100</authorImage></item><item><title><![CDATA[How to Create List in C#]]></title><description><![CDATA[In this article, we will learn how to create lists in C# also how to use the C# list class to add, remove, and search items in a collection of objects.]]></description><link>https://www.loginradius.com/blog/engineering/list-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/list-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[List]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7bd585b5527fa11b07e771ae747529cd/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, we will learn how to create lists in C# also how to use the C# list class to add, remove, and search items in a collection of objects. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/list-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[What is a DDoS Attack and How to Mitigate it]]></title><description><![CDATA[Learn what a DDoS attack is, including the various classifications of attacks, and how to defend your site from one.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-mitigate-ddos-attack/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-mitigate-ddos-attack/</guid><category><![CDATA[DDoS]]></category><category><![CDATA[DDos mitigate]]></category><category><![CDATA[DDoS Prevention]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Wed, 24 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/72332960e1243ffa32dc827adaf67f77/58556/What-is-a-DDoS-attack.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn what a DDoS attack is, including the various classifications of attacks, and how to defend your site from one. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-mitigate-ddos-attack/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Walking the Fine Line Between Consumer Experience and Privacy]]></title><description><![CDATA[Consent as well as robust security protocols play key roles in walking the fine line between data management and consumer privacy expectations. An organization that handles their consumers’ data ethically stands to gain a considerable edge against competitors through greater access to data, consumer trust, and potential to secure more privacy-conscious consumers.]]></description><link>https://www.loginradius.com/blog/growth/consumer-experience-and-privacy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-experience-and-privacy/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/99838ade013331305fe537175a2e1cf1/58556/consumer-experience-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Consent as well as robust security protocols play key roles in walking the fine line between data management and consumer privacy expectations. An organization that handles their consumers’ data ethically stands to gain a considerable edge against competitors through greater access to data, consumer trust, and potential to secure more privacy-conscious consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-experience-and-privacy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Organizations Must Use API-Driven CIAM for Digital Agility]]></title><description><![CDATA[Digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. For a successful digital transformation, organizations need to invest in resilient business operations, consumer experience initiatives, and technology.]]></description><link>https://www.loginradius.com/blog/identity/digital-agility/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-agility/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/227e71fd3c3a37cb135823ebe2e06775/58556/digital-agility.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. For a successful digital transformation, organizations need to invest in resilient business operations, consumer experience initiatives, and technology. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-agility/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Do Consumers Prefer Social Login [Infographic]]]></title><description><![CDATA[Social login simplifies registration and login for consumers. For this primary reason, social login is gaining popularity among ecommerce brands and retailers looking to turn visitors into buying customers.]]></description><link>https://www.loginradius.com/blog/identity/social-login-infographic/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/social-login-infographic/</guid><category><![CDATA[ciam]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 24 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7edea2bda77b004331d430b340a1c764/58556/social-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social login simplifies registration and login for consumers. For this primary reason, social login is gaining popularity among ecommerce brands and retailers looking to turn visitors into buying customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/social-login-infographic/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Tricks to Attract MORE Consumers to Your Website]]></title><description><![CDATA[The right way to attract consumers to your website need not be rocket science. All you need is a good strategy and consistency to make things work for you. Constant content upgrades can always help you drive traffic to your website; simply make sure they are SEO optimized.]]></description><link>https://www.loginradius.com/blog/growth/attract-consumers-to-your-website/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/attract-consumers-to-your-website/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 23 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/72058d4882cfc22391837b88b2695594/58556/consumer-to-website.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The right way to attract consumers to your website need not be rocket science. All you need is a good strategy and consistency to make things work for you. Constant content upgrades can always help you drive traffic to your website; simply make sure they are SEO optimized. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/attract-consumers-to-your-website/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Steps to Build a High Performing Growth Team in 2021]]></title><description><![CDATA[No recipe can assure an A-grade workforce. When it comes to creating high-performing teams, you must get creative. With commitment, forbearance, and a little direction, you'll be off to formulating high-performing squads in no time who can take the core product and your business to new heights.]]></description><link>https://www.loginradius.com/blog/growth/high-performing-growth-team/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/high-performing-growth-team/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 23 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4c649909ad9af3c6ed5b897ed60d9d7c/58556/growth-team.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; No recipe can assure an A-grade workforce. When it comes to creating high-performing teams, you must get creative. With commitment, forbearance, and a little direction, you&apos;ll be off to formulating high-performing squads in no time who can take the core product and your business to new heights. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/high-performing-growth-team/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Tips for Choosing the Right Password Manager for Your Team]]></title><description><![CDATA[When it comes to a password manager for business, always invest coherently.  As there are immense options available in the market with forever free and feature scale-up modes, prioritize better functionality and security over fancy designs or a complicated interface.]]></description><link>https://www.loginradius.com/blog/growth/password-manager-tips/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/password-manager-tips/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 23 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cf26ed6d88ca2705924d51a515464723/58556/password-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When it comes to a password manager for business, always invest coherently.  As there are immense options available in the market with forever free and feature scale-up modes, prioritize better functionality and security over fancy designs or a complicated interface. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/password-manager-tips/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Verify Email Addresses in Google Sheet]]></title><description><![CDATA[Directly checking email addresses for authenticity in the Google spreadsheet using EVA has never been easier. In this article, you will learn how to validate email addresses using EVA services in Google Sheets.]]></description><link>https://www.loginradius.com/blog/engineering/eva-google-script/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/eva-google-script/</guid><category><![CDATA[EVA]]></category><category><![CDATA[Google Script]]></category><category><![CDATA[Email Validation]]></category><dc:creator><![CDATA[Narendra Pareek]]></dc:creator><pubDate>Mon, 22 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ceb7964161e870323d19abf772193401/58556/eva.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Directly checking email addresses for authenticity in the Google spreadsheet using EVA has never been easier. In this article, you will learn how to validate email addresses using EVA services in Google Sheets. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/eva-google-script/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/pareek-narendra.png?size=100v=40</authorImage></item><item><title><![CDATA[Hybrid Workforce: Laying The Foundation of Remote Working]]></title><description><![CDATA[A hybrid workforce model is the future of the remote workforce. Most companies are planning to let their employees work remotely to ensure the continuity of the increased performance. Employees were willing to put in more work hours due to the relaxed atmosphere of their home.]]></description><link>https://www.loginradius.com/blog/growth/hybrid-workforce/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/hybrid-workforce/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 22 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/25b10537d477ea65198ef4a1175dee04/58556/hybrid-workforce.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A hybrid workforce model is the future of the remote workforce. Most companies are planning to let their employees work remotely to ensure the continuity of the increased performance. Employees were willing to put in more work hours due to the relaxed atmosphere of their home. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/hybrid-workforce/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Concurrency vs Parallelism: What's the Difference?]]></title><description><![CDATA[Concurrence and parallelism in relation to multithreaded applications are two concepts sometimes used. The distinction between concurrency and parallelism is clarified in this tutorial.]]></description><link>https://www.loginradius.com/blog/engineering/concurrency-vs-parallelism/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/concurrency-vs-parallelism/</guid><category><![CDATA[Concurrency]]></category><category><![CDATA[Parallelism]]></category><category><![CDATA[Multithreading]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Fri, 19 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1592330a691b94decfefeb2601f55b9/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Concurrence and parallelism in relation to multithreaded applications are two concepts sometimes used. The distinction between concurrency and parallelism is clarified in this tutorial. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/concurrency-vs-parallelism/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Best Practices of Implementing Business Resilience during a Data Breach]]></title><description><![CDATA[Business resilience can be defined as a business’ ability to quickly adapt and respond to impending risks or disruptions. More like a combination of crisis management and business continuity strategies post-disaster.]]></description><link>https://www.loginradius.com/blog/identity/best-practices-business-resilience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-practices-business-resilience/</guid><category><![CDATA[data security]]></category><category><![CDATA[resiliency]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 18 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6de8a6789dd41cd47df325d36d36fe65/58556/business-resilience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Business resilience can be defined as a business’ ability to quickly adapt and respond to impending risks or disruptions. More like a combination of crisis management and business continuity strategies post-disaster. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-practices-business-resilience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[35+ Git Commands List Every Programmer Should Know]]></title><description><![CDATA[In this article, I will talk about the Git Commands that you will be using often when you are working with Git.]]></description><link>https://www.loginradius.com/blog/engineering/git-commands/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/git-commands/</guid><category><![CDATA[GIT]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Wed, 17 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/809159647d5b83fd76f6bc5ef35bab91/58556/git.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, I will talk about the Git Commands that you will be using often when you are working with Git. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/git-commands/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Broken Authentication Vulnerability and How to Prevent It?]]></title><description><![CDATA[If a hacker successfully logs with stolen credentials, they can misuse your privileges and impact your company's sustainability. Authentication protects a consumer's identity by allowing only a verified user to enter into the system. But there are numerous ways through which a hacker can impersonate consumers and enter inside the system.]]></description><link>https://www.loginradius.com/blog/identity/what-is-broken-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-broken-authentication/</guid><category><![CDATA[broken authentication]]></category><category><![CDATA[mfa]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 17 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8fb0491d4b2d2c88a9837287c83195f7/7f8e9/broken-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If a hacker successfully logs with stolen credentials, they can misuse your privileges and impact your company&apos;s sustainability. Authentication protects a consumer&apos;s identity by allowing only a verified user to enter into the system. But there are numerous ways through which a hacker can impersonate consumers and enter inside the system. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-broken-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to do Full-Text Search in MongoDB]]></title><description><![CDATA[MongoDB full text search tutorial. In this blog, we will learn how to perform a full-text search in MongoDB using text index.]]></description><link>https://www.loginradius.com/blog/engineering/full-text-search-in-mongodb/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/full-text-search-in-mongodb/</guid><category><![CDATA[MongoDB]]></category><dc:creator><![CDATA[Anil Gupta]]></dc:creator><pubDate>Tue, 16 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4c86ce656fbbcd1cebd60b0c6606d53/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; MongoDB full text search tutorial. In this blog, we will learn how to perform a full-text search in MongoDB using text index. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/full-text-search-in-mongodb/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/anilswm.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Introduces Convenient and Secure Biometric Authentication for Mobile Apps]]></title><description><![CDATA[The LoginRadius Mobile Biometric Authentication feature is dedicated to mobile applications and enables users to use the FaceID and TouchID of their mobile devices for authentication purposes.]]></description><link>https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/</guid><category><![CDATA[biometric authentication]]></category><category><![CDATA[cx]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 16 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/04ded459c8909fa08c0befc317400736/c0524/biometric-authentication-mobile-apps.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The LoginRadius Mobile Biometric Authentication feature is dedicated to mobile applications and enables users to use the FaceID and TouchID of their mobile devices for authentication purposes. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is API Testing? - Discover the Benefits]]></title><description><![CDATA[Communication between software components is handled by an API (Application Programming Interface). Discover the advantages of automated API testing.]]></description><link>https://www.loginradius.com/blog/engineering/api-testing-and-benefits/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/api-testing-and-benefits/</guid><category><![CDATA[Automation]]></category><category><![CDATA[API Testing]]></category><category><![CDATA[Agile]]></category><category><![CDATA[Benefits]]></category><dc:creator><![CDATA[Surendranath Reddy Birudala]]></dc:creator><pubDate>Fri, 12 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/80a2124798188a2366a8093c6f4d4afc/71802/api-testing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Communication between software components is handled by an API (Application Programming Interface). Discover the advantages of automated API testing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/api-testing-and-benefits/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/reddysuren.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Shift Focus From Consumer Management to Consumer Engagement]]></title><description><![CDATA[Historically, organizations were more focused on managing and facilitating consumers' to be on top of everything. However, in the past couple of years, the paradigm has shifted from working as the facilitator to acting as a consultant and driving consumer engagement.]]></description><link>https://www.loginradius.com/blog/growth/consumer-management-to-consumer-engagement/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-management-to-consumer-engagement/</guid><dc:creator><![CDATA[Yash Rathi]]></dc:creator><pubDate>Fri, 12 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ac9ac9c473f25e91d74335f1a7c20d40/58556/consumer-engagement.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Historically, organizations were more focused on managing and facilitating consumers&apos; to be on top of everything. However, in the past couple of years, the paradigm has shifted from working as the facilitator to acting as a consultant and driving consumer engagement. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-management-to-consumer-engagement/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/yashrathi29.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Deliver the Perfect Consumer Support System for SaaS Companies]]></title><description><![CDATA[An efficient consumer support team is more than just the front line support personnel interacting with your consumers. Supporting consumers must be an organization-wide initiative. All teams bring unique systems, skill sets, and perspectives to your consumer support processes.]]></description><link>https://www.loginradius.com/blog/growth/saas-consumer-support/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/saas-consumer-support/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 12 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4808f563820679cffbd8b3bd65edcbe7/58556/saas-consumer-support.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; An efficient consumer support team is more than just the front line support personnel interacting with your consumers. Supporting consumers must be an organization-wide initiative. All teams bring unique systems, skill sets, and perspectives to your consumer support processes. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/saas-consumer-support/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[13 Tips for Leading and Managing Remote Teams]]></title><description><![CDATA[Educating employees about the purpose of remote working can help them understand the importance of maintaining a healthy work-from-home culture. Here are some remote working tips that can ease the pressure and challenges of the work-from-home model for organizations and their management.]]></description><link>https://www.loginradius.com/blog/growth/tips-managing-remote-team/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/tips-managing-remote-team/</guid><dc:creator><![CDATA[Vikas Soni]]></dc:creator><pubDate>Fri, 12 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/78dc9da0cbd49e7c527ffed4a1cdeed7/58556/tips-managing-remote-team.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Educating employees about the purpose of remote working can help them understand the importance of maintaining a healthy work-from-home culture. Here are some remote working tips that can ease the pressure and challenges of the work-from-home model for organizations and their management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/tips-managing-remote-team/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vikas Soni&amp;size=100</authorImage></item><item><title><![CDATA[6 Strategies to Secure Your Cloud Operations Against Today's Cyber Threats]]></title><description><![CDATA[One of the most important steps for successful cloud operations is to keep your cloud environment safe and secure. Generally, businesses are eager to adopt cloud solutions, but the primary factor that keeps enterprises on their toes is their security issues. In this article, we'll discuss a few strategies needed to secure your cloud operations from cyber threats.]]></description><link>https://www.loginradius.com/blog/identity/strategies-secure-cloud-operations/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/strategies-secure-cloud-operations/</guid><category><![CDATA[cloud security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 12 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2a70e22d27ae8c91847834dc06593f35/58556/secure-cloud.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; One of the most important steps for successful cloud operations is to keep your cloud environment safe and secure. Generally, businesses are eager to adopt cloud solutions, but the primary factor that keeps enterprises on their toes is their security issues. In this article, we&apos;ll discuss a few strategies needed to secure your cloud operations from cyber threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/strategies-secure-cloud-operations/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Importance of Multi-Factor Authentication (MFA)]]></title><description><![CDATA[Multi-factor authentication verifies the consumer's identity in multiple steps using different methods. Hence, it provides another layer of security on top of the login credentials.]]></description><link>https://www.loginradius.com/blog/engineering/why-mfa-important/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/why-mfa-important/</guid><category><![CDATA[MFA]]></category><category><![CDATA[2FA]]></category><category><![CDATA[PIN Auth]]></category><category><![CDATA[Push-based Auth]]></category><dc:creator><![CDATA[Jitender Agarwal]]></dc:creator><pubDate>Thu, 11 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f69cc41fc979dccdf93a86c17f5e51e5/58556/multifactor-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Multi-factor authentication verifies the consumer&apos;s identity in multiple steps using different methods. Hence, it provides another layer of security on top of the login credentials. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/why-mfa-important/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jitender Agarwal&amp;size=100</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Introduces Password Policy to Ensure Best Practices for Businesses and Consumers]]></title><description><![CDATA[In securing company and customer data, the LoginRadius Password Policy provides the first line of protection. The newly released function offers a plethora of robust password management opportunities, from setting difficulty criteria to stopping users from choosing previously used passwords.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/</guid><category><![CDATA[password management]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 11 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a8d0bb75c5fa0ac4687aa34dcf1b7412/c0524/loginradius-password-policy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In securing company and customer data, the LoginRadius Password Policy provides the first line of protection. The newly released function offers a plethora of robust password management opportunities, from setting difficulty criteria to stopping users from choosing previously used passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How Is New Age Ciam Revolutionizing Consumer Experience?]]></title><description><![CDATA[How New-Age CIAM is Revolutionizing Consumer Experience Consumer Identity and Access Management (CIAM) is on the fast-track to going mainstream. What has put CIAM on the forefront is the proficiency to excel in the three most crucial aspects: profiling consumer data, managing consumer identity, and controlling consumer access to applications.]]></description><link>https://www.loginradius.com/blog/identity/new-age-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/new-age-ciam/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 11 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/438e94c9159d074111c197659ff50e2d/7f8e9/a-new-age-CIAM.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How New-Age CIAM is Revolutionizing Consumer Experience Consumer Identity and Access Management (CIAM) is on the fast-track to going mainstream. What has put CIAM on the forefront is the proficiency to excel in the three most crucial aspects: profiling consumer data, managing consumer identity, and controlling consumer access to applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/new-age-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Optimize Your Sign Up Page By Going Passwordless]]></title><description><![CDATA[How passwordless can be an excellent approach to reduce user drops on the signup page with better UX practices.]]></description><link>https://www.loginradius.com/blog/engineering/signup-using-passwordless/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/signup-using-passwordless/</guid><category><![CDATA[Passwordless]]></category><dc:creator><![CDATA[Ravi Teja Ganta]]></dc:creator><pubDate>Wed, 10 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6828833d7eb0dad6d57075a8365adb95/58556/open-source.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How passwordless can be an excellent approach to reduce user drops on the signup page with better UX practices. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/signup-using-passwordless/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/ravitejag.png?size=100v=40</authorImage></item><item><title><![CDATA[Image Colorizer Tool - Kolorizer]]></title><description><![CDATA[Kolorizer is a free photo coloring tool to help you align the images on a website with your brand.]]></description><link>https://www.loginradius.com/blog/engineering/image-colorizer-tool-kolorizer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/image-colorizer-tool-kolorizer/</guid><category><![CDATA[Design]]></category><category><![CDATA[Photos]]></category><category><![CDATA[Brand]]></category><dc:creator><![CDATA[Max Sergeyenko]]></dc:creator><pubDate>Tue, 09 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/caf32b1ff5bb357db79f2d0c25e7daeb/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Kolorizer is a free photo coloring tool to help you align the images on a website with your brand. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/image-colorizer-tool-kolorizer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/maxsergeyenko.png?size=100v=40</authorImage></item><item><title><![CDATA[PWA vs Native App: Which one is Better for you?]]></title><description><![CDATA[How do Native Apps compare to Progressive Web Apps, and which platform does your company use to communicate with your clients? read on!]]></description><link>https://www.loginradius.com/blog/engineering/progressive-app-vs-native-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/progressive-app-vs-native-app/</guid><category><![CDATA[Progressive App]]></category><category><![CDATA[PWA]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Nathan Nguyen]]></dc:creator><pubDate>Thu, 04 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fd52b7dab79665e5aa8e0074faec8e6c/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How do Native Apps compare to Progressive Web Apps, and which platform does your company use to communicate with your clients? read on! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/progressive-app-vs-native-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/nathannguyenn.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Federated Identity Management]]></title><description><![CDATA[ Let's face it upfront. Password management is a painful exercise, which no one wants to deal with. Though guessable passwords make them easy to remember, it exposes consumers to hackers. Fortunately, federated ID management ensures both seamless and secure access that goes a long way in enhancing the overall user-experience.]]></description><link>https://www.loginradius.com/blog/identity/what-is-federated-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-federated-identity-management/</guid><category><![CDATA[federated identity management]]></category><category><![CDATA[identity provider]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 04 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/10b334add07a2af49998e59d9a897d5c/7f8e9/what-is-fim.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Let&apos;s face it upfront. Password management is a painful exercise, which no one wants to deal with. Though guessable passwords make them easy to remember, it exposes consumers to hackers. Fortunately, federated ID management ensures both seamless and secure access that goes a long way in enhancing the overall user-experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-federated-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Deploy a REST API in Kubernetes]]></title><description><![CDATA[Beginner guide on how to create and deploy a REST API in local Kubernetes.]]></description><link>https://www.loginradius.com/blog/engineering/rest-api-kubernetes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/rest-api-kubernetes/</guid><category><![CDATA[Kubernetes]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Wed, 03 Feb 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3e013df11f99b320029a3e4aadafc0ea/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Beginner guide on how to create and deploy a REST API in local Kubernetes. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/rest-api-kubernetes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Integration with electronic identity (eID) ]]></title><description><![CDATA[An electronic identity is an electronic card or device with a unique identity number issued by either a government agency or some banks.LoginRadius supports all the major industry federated SSO methods. Hence, you can integrate eID authentication with LoginRadius using some third application like Criipto, which supports the industry-standard SSO methods.]]></description><link>https://www.loginradius.com/blog/engineering/electronic-identity-integration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/electronic-identity-integration/</guid><category><![CDATA[Electronic Identity]]></category><category><![CDATA[Bank ID]]></category><category><![CDATA[Criipto]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Jitender Agarwal]]></dc:creator><pubDate>Fri, 29 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b916d567b9e41b342cccd7613d625bf6/8829b/Integration_with_eID.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; An electronic identity is an electronic card or device with a unique identity number issued by either a government agency or some banks.LoginRadius supports all the major industry federated SSO methods. Hence, you can integrate eID authentication with LoginRadius using some third application like Criipto, which supports the industry-standard SSO methods. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/electronic-identity-integration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Jitender Agarwal&amp;size=100</authorImage></item><item><title><![CDATA[How to Work with Nullable Types in C#]]></title><description><![CDATA[Nullable is a term in C# that allows an extra value null to be owned by a form. We will learn in this article how to work with Nullable types in C#.]]></description><link>https://www.loginradius.com/blog/engineering/nullable-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/nullable-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[Nullable]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Fri, 29 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/41c1ba90d916c8835ab6561b428a152d/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Nullable is a term in C# that allows an extra value null to be owned by a form. We will learn in this article how to work with Nullable types in C#. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/nullable-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[7 Common Web Application Security Threats]]></title><description><![CDATA[To ensure adequate safety against web application security threats, businesses should incorporate security consideration in the applications' development phase. Unfortunately, most developers tend to hold it off until the end.]]></description><link>https://www.loginradius.com/blog/identity/7-web-app-sec-threats/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/7-web-app-sec-threats/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/352ac81926b9a109f2ae55cd0233ce55/176df/7-Common-Web-Application-Security-Threats-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; To ensure adequate safety against web application security threats, businesses should incorporate security consideration in the applications&apos; development phase. Unfortunately, most developers tend to hold it off until the end. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/7-web-app-sec-threats/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity Management in Cloud Computing]]></title><description><![CDATA[Identity management in cloud computing is the subsequent step of identity and access management (IAM) solutions. However, it is a lot more than merely a straightforward web app single sign-on (SSO) solution. This next generation of IAM solution is a holistic move of the identity provider right to the cloud. ]]></description><link>https://www.loginradius.com/blog/identity/identity-management-in-cloud-computing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-management-in-cloud-computing/</guid><category><![CDATA[cloud computing]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8ff84dc6e792bb7859169cfabb25d471/176df/identity-management-in-cloud-computing-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity management in cloud computing is the subsequent step of identity and access management (IAM) solutions. However, it is a lot more than merely a straightforward web app single sign-on (SSO) solution. This next generation of IAM solution is a holistic move of the identity provider right to the cloud.  &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-management-in-cloud-computing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Identity and Access Management (IAM)?]]></title><description><![CDATA[Identity and Access Management in cybersecurity refers to the security framework and disciplines for managing digital identities. It regulates the responsibilities and access privileges associated with individual consumers and the conditions in which such privileges are allowed or denied.]]></description><link>https://www.loginradius.com/blog/identity/what-is-iam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-iam/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/776ccabef13cf14119f06e705f8a1b7c/c0524/What-is-IAM-Cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity and Access Management in cybersecurity refers to the security framework and disciplines for managing digital identities. It regulates the responsibilities and access privileges associated with individual consumers and the conditions in which such privileges are allowed or denied. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-iam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>12</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Git merge vs. Git Rebase: What's the difference?]]></title><description><![CDATA[In this post, I will give you a walkthrough on merge and rebase, comparing Git rebase vs. Git merge to find out the similarities and differences.]]></description><link>https://www.loginradius.com/blog/engineering/git-rebase-vs-git-merge/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/git-rebase-vs-git-merge/</guid><category><![CDATA[GIT]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Wed, 27 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/23c891d4a8760d428bfc6f05aa86f387/58556/merge.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this post, I will give you a walkthrough on merge and rebase, comparing Git rebase vs. Git merge to find out the similarities and differences. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/git-rebase-vs-git-merge/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Announces Identity Brokering To Establish Trust Between Identity and Service Providers]]></title><description><![CDATA[Using Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-identity-brokering/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-identity-brokering/</guid><category><![CDATA[identity management]]></category><category><![CDATA[authentication]]></category><category><![CDATA[sso]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/839cf09f4bf02d1e0413101ff032e7e7/c0524/loginradius-identity-brokering.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Using Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-identity-brokering/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Ways User Onboarding Software Can Revamp Your Application]]></title><description><![CDATA[The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them.]]></description><link>https://www.loginradius.com/blog/identity/user-onboarding-revamp-application/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/user-onboarding-revamp-application/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 27 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bc1d90dc8e869db17c97f94dd4190922/176df/user-onboarding-application.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/user-onboarding-revamp-application/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Achieve a 360-Degree Growth with Data-Driven Approach]]></title><description><![CDATA[In order to optimize their marketing efforts, marketers are continually searching for a better plan, and a 360 data driven approach would be crucial to unravelling the required customer insights.]]></description><link>https://www.loginradius.com/blog/growth/360-degree-growth-data-driven/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/360-degree-growth-data-driven/</guid><dc:creator><![CDATA[Shachindra Saxena]]></dc:creator><pubDate>Mon, 25 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2431033287ce081448eacaa0e24d2485/58556/360-degree-growth-with-data-driven.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In order to optimize their marketing efforts, marketers are continually searching for a better plan, and a 360 data driven approach would be crucial to unravelling the required customer insights. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/360-degree-growth-data-driven/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shachindra Saxena&amp;size=100</authorImage></item><item><title><![CDATA[How to Install and Configure Istio]]></title><description><![CDATA[This article will provide a step by step process on how to install and configure services using Istio.]]></description><link>https://www.loginradius.com/blog/engineering/istio-installation-and-service-configuration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/istio-installation-and-service-configuration/</guid><category><![CDATA[Istio]]></category><category><![CDATA[Service Mesh]]></category><dc:creator><![CDATA[Piyush Kumar]]></dc:creator><pubDate>Fri, 22 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8ff8c7b29395837a840c4013f351290/58556/Istio.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article will provide a step by step process on how to install and configure services using Istio. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/istio-installation-and-service-configuration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/kpiyush17.png?size=100v=40</authorImage></item><item><title><![CDATA[How to secure an email address on your website]]></title><description><![CDATA[Harvesting bots are here to stay. Luckily, there are a few ways to hide your email address from spammers and hackers who constantly mine for the same. One way is through email harvesting. Let's talk about what it is and then explore the various ways to secure your email address.]]></description><link>https://www.loginradius.com/blog/identity/secure-email-address-website/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/secure-email-address-website/</guid><category><![CDATA[all, Security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 22 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cd82884d7273d03edc2977f58a156ff5/58556/secure-email-address-website.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Harvesting bots are here to stay. Luckily, there are a few ways to hide your email address from spammers and hackers who constantly mine for the same. One way is through email harvesting. Let&apos;s talk about what it is and then explore the various ways to secure your email address. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/secure-email-address-website/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Perform Basic Query Operations in MongoDB]]></title><link>https://www.loginradius.com/blog/engineering/basic-query-operations-in-mongodb/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/basic-query-operations-in-mongodb/</guid><category><![CDATA[MongoDB]]></category><dc:creator><![CDATA[Anil Gupta]]></dc:creator><pubDate>Wed, 20 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4c86ce656fbbcd1cebd60b0c6606d53/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this article, we will address how to perform basic query operations in MongoDB. We are producing data at an unparalleled pace now following the global spread of the internet. Since it will require us to collect/request the required data from the database to conduct some kind… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/basic-query-operations-in-mongodb/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/anilswm.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 27 User Onboarding Tools: Highly Recommended for Businesses]]></title><description><![CDATA[Customer Onboarding is a crucial phase that comprises the user's entire lifecycle. The best onboarding experiences allow users to reach their magic moment quickly; for long-term success, they even set up new users.]]></description><link>https://www.loginradius.com/blog/growth/user-onboarding-tools/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/user-onboarding-tools/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Wed, 20 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dfa51580d0d304ecd72480c5e6a1915c/58556/user-onboarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customer Onboarding is a crucial phase that comprises the user&apos;s entire lifecycle. The best onboarding experiences allow users to reach their magic moment quickly; for long-term success, they even set up new users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/user-onboarding-tools/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[Invalidating JSON Web Tokens]]></title><description><![CDATA[A discussion on invalidating JSON Web Tokens.]]></description><link>https://www.loginradius.com/blog/engineering/invalidating-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/invalidating-jwt/</guid><category><![CDATA[JSON Web Tokens]]></category><category><![CDATA[JWT]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Mon, 18 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0c11b157497c5b54f5a0149f01ce15ac/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A discussion on invalidating JSON Web Tokens. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/invalidating-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Tips to Enhance the Consumer Experience in B2B SaaS]]></title><description><![CDATA[Assessment and improvement of customer experience is not only appropriate to consumers; it is good for the business. A focus on CX provides a competitive advantage that over time drives customer retention, revenue growth, and business valuation.]]></description><link>https://www.loginradius.com/blog/growth/consumer-experience-b2b-saas/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/consumer-experience-b2b-saas/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 15 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8b021738f3c5d8b2fa9f24280581cba8/58556/5-tips-consumer-experience-b2b-saas.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Assessment and improvement of customer experience is not only appropriate to consumers; it is good for the business. A focus on CX provides a competitive advantage that over time drives customer retention, revenue growth, and business valuation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/consumer-experience-b2b-saas/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Formjacking]]></title><description><![CDATA[Formjacking attacks are designed and executed by cybercriminals to steal financial and banking details from payment forms that can be captured directly on the checkout pages from eCommerce websites. Find out more about how this practice can affect your business and how to prevent it.]]></description><link>https://www.loginradius.com/blog/identity/what-is-formjacking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-formjacking/</guid><category><![CDATA[all, Security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 15 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5191c0f446f23f7143b5d689288c632f/176df/what-is-formjacking.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Formjacking attacks are designed and executed by cybercriminals to steal financial and banking details from payment forms that can be captured directly on the checkout pages from eCommerce websites. Find out more about how this practice can affect your business and how to prevent it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-formjacking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[DNS Cache Poisoning: Why Is It Dangerous for Your Business]]></title><description><![CDATA[DNS cache poisoning is an attack that uses changed DNS records to redirect online traffic to a website that is fake and resembles its intended destination.]]></description><link>https://www.loginradius.com/blog/identity/dns-cache-poisoning/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/dns-cache-poisoning/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 13 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7e1bb1018935ea6ad142371ea983e66c/176df/dns-cache-poisoning-is-dangerous-for-your-business.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; DNS cache poisoning is an attack that uses changed DNS records to redirect online traffic to a website that is fake and resembles its intended destination. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/dns-cache-poisoning/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Use the HTTP Client in GO To Enhance Performance]]></title><description><![CDATA[In this post, we will discuss how to make HTTP requests for higher performance in Go, and also how to tune it.]]></description><link>https://www.loginradius.com/blog/engineering/tune-the-go-http-client-for-high-performance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/tune-the-go-http-client-for-high-performance/</guid><category><![CDATA[Golang]]></category><category><![CDATA[HTTP]]></category><category><![CDATA[Performance]]></category><dc:creator><![CDATA[Mayank Agarwal]]></dc:creator><pubDate>Tue, 12 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2aae63044134172737715b9d1801c174/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this post, we will discuss how to make HTTP requests for higher performance in Go, and also how to tune it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/tune-the-go-http-client-for-high-performance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/mayankagrwal.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Set Up Two-factor Authentication on All Your Online Accounts?]]></title><description><![CDATA[2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer's phone number or generated through an app]]></description><link>https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/</guid><category><![CDATA[2fa]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 12 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7633d1f15469d3c7adb2d4be805f653e/176df/how-to-setup-2fa-online-accounts.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; 2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer&apos;s phone number or generated through an app &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Digital Transformation]]></title><description><![CDATA[Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. So, has the dynamics changed with the COVID-19 pandemic? You are about to find out.]]></description><link>https://www.loginradius.com/blog/identity/what-is-digital-transformation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-digital-transformation/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 11 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/527e95c356974fb1a265602727128923/176df/what-is-digital-transformation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. So, has the dynamics changed with the COVID-19 pandemic? You are about to find out. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-digital-transformation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>15</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Do's and Don'ts of Choosing a Secure Password]]></title><description><![CDATA[Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of cyberattack.]]></description><link>https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/</guid><category><![CDATA[data security]]></category><category><![CDATA[password management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 06 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5f6051708c66e72baac79bef4567e9b4/176df/how-to-choose-a-secure-password-in-2021.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do&apos;s and don&apos;t on how to choose a strong password to avoid being a victim of cyberattack. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>11</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Constructor vs getInitialState in React]]></title><description><![CDATA[No ES6? No problem. getInitialState is the ES5 friendly method to define the initial state of a React component.]]></description><link>https://www.loginradius.com/blog/engineering/react-constructor-get-initial-state/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-constructor-get-initial-state/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[React]]></category><dc:creator><![CDATA[Nathan Nguyen]]></dc:creator><pubDate>Tue, 05 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d152aa4ad7b599edbdd9b6465d8f014b/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; No ES6? No problem. getInitialState is the ES5 friendly method to define the initial state of a React component. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-constructor-get-initial-state/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/nathannguyenn.png?size=100v=40</authorImage></item><item><title><![CDATA[Engineering As Marketing: 5 Growth Hack Strategies For Modern Businesses]]></title><description><![CDATA[Engineering as Marketing is about utilising engineering time to build helpful tools such as calculators, checkers or checklists, widgets, and even micro-sites that introduce your business to potential customers.]]></description><link>https://www.loginradius.com/blog/growth/engineering-as-marketing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/engineering-as-marketing/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 05 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/17839d77db7a64dfea6b8948595e2ae5/58556/engineering-as-marketing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Engineering as Marketing is about utilising engineering time to build helpful tools such as calculators, checkers or checklists, widgets, and even micro-sites that introduce your business to potential customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/engineering-as-marketing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[North Star Metric: 6 steps to discover your NSM]]></title><description><![CDATA[In industry, the North Star Metric was developed to give businesses a singular focus on a single objective. Instead of being distracted by everyday matters or individual tasks, everyone can always evaluate success by whether or not they are advancing the organisation using this metric.]]></description><link>https://www.loginradius.com/blog/growth/north-star-metrics-nsm/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/north-star-metrics-nsm/</guid><dc:creator><![CDATA[Archna Yadav]]></dc:creator><pubDate>Tue, 05 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/12016ce9c5069f8263f2f6a8327fb96d/58556/north-star-metrics.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In industry, the North Star Metric was developed to give businesses a singular focus on a single objective. Instead of being distracted by everyday matters or individual tasks, everyone can always evaluate success by whether or not they are advancing the organisation using this metric. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/north-star-metrics-nsm/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Archna Yadav&amp;size=100</authorImage></item><item><title><![CDATA[9 Signup Tips To Skyrocket The Conversion Rate]]></title><description><![CDATA[It should be clear and easy to understand your sign-up form. Avoid using undefined fields that frustrate users. Your next step is to follow the tips and examples shown in this article. If you can get it right, better conversion sign-up forms can be developed and the amount of quality leads produced can be increased.]]></description><link>https://www.loginradius.com/blog/growth/sign-up-tips-conversion-rate/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/sign-up-tips-conversion-rate/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 05 Jan 2021 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c8ded9277ed3e702a11e14fec796a47a/58556/sign-up-rate.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It should be clear and easy to understand your sign-up form. Avoid using undefined fields that frustrate users. Your next step is to follow the tips and examples shown in this article. If you can get it right, better conversion sign-up forms can be developed and the amount of quality leads produced can be increased. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/sign-up-tips-conversion-rate/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Web Workers in JS - An Introductory Guide]]></title><description><![CDATA[Learn how to use JavaScript web workers to create parallel programming and execute multiple operations concurrently rather than interconnecting them.]]></description><link>https://www.loginradius.com/blog/engineering/web-workers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/web-workers/</guid><category><![CDATA[Web Workers]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Mon, 28 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/60585d671e6de5ad794eb12d714614ec/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to use JavaScript web workers to create parallel programming and execute multiple operations concurrently rather than interconnecting them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/web-workers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Secure Your Contact Form From Bot Attacks]]></title><description><![CDATA[It is no surprise that the contact form attracts a lot of bot attacks. Hackers not only create false traffic, but also result in malicious attacks on websites. The objective of this blog is to help you to secure contact form from random audacious attacks.]]></description><link>https://www.loginradius.com/blog/identity/bot-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/bot-attacks/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 24 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c9302772d8ec4d5c5b65d9482ae0d0f1/7f8e9/bot-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is no surprise that the contact form attracts a lot of bot attacks. Hackers not only create false traffic, but also result in malicious attacks on websites. The objective of this blog is to help you to secure contact form from random audacious attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/bot-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Use Enum in C#]]></title><description><![CDATA[Would you like to become more proficient in your C# programming in the use of enums? To learn the basics and use cases for Enum in C#, read this post.]]></description><link>https://www.loginradius.com/blog/engineering/enum-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/enum-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[Enum]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Fri, 18 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4730f4a49850d621c2969f5405e589e1/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Would you like to become more proficient in your C# programming in the use of enums? To learn the basics and use cases for Enum in C#, read this post. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/enum-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Identity Proofing and Why is it Important?]]></title><description><![CDATA[Identity proofing is the process of verifying that the claimed identity of a person matches their actual identity. You’ve probably undergone this process a bunch of times yourself at hotels, financial institutions, and for retailers.]]></description><link>https://www.loginradius.com/blog/identity/identity-proofing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-proofing/</guid><category><![CDATA[data security]]></category><category><![CDATA[identity proofing]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 18 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f4b8dc6ef8daa931899d49bebcc692e8/7f8e9/identity-proofing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity proofing is the process of verifying that the claimed identity of a person matches their actual identity. You’ve probably undergone this process a bunch of times yourself at hotels, financial institutions, and for retailers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-proofing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Identity Governance & Administration?]]></title><description><![CDATA[Needless to mention, the question of relevant certification of access to specified stakeholders also applies. In an increasingly agility-intensive and virtual work environment, identity governance seems immensely relevant with the automation of policy management and auditing, adding to its benefit.]]></description><link>https://www.loginradius.com/blog/identity/identity-governance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-governance/</guid><category><![CDATA[data security]]></category><category><![CDATA[identity governance]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/256abcc09f29337badcdf28c241647f7/7f8e9/identity-governanc.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Needless to mention, the question of relevant certification of access to specified stakeholders also applies. In an increasingly agility-intensive and virtual work environment, identity governance seems immensely relevant with the automation of policy management and auditing, adding to its benefit. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-governance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement: LoginRadius Embraces Privacy Policy Management Amid Heightened Regulatory Updates]]></title><description><![CDATA[Our newly introduced Privacy Policy Management acts as the central place where companies retain versions of their privacy policy, inform customers when it changes, or get new versions adopted by them.]]></description><link>https://www.loginradius.com/blog/identity/privacy-policy-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/privacy-policy-management/</guid><category><![CDATA[compliance]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/626b01097f0be96dae7e081b2fdc68c7/c0524/privacy-policy-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Our newly introduced Privacy Policy Management acts as the central place where companies retain versions of their privacy policy, inform customers when it changes, or get new versions adopted by them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/privacy-policy-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[How to Migrate Data In MongoDB]]></title><description><![CDATA[This article covers the guide to migrate data from offline or live MongoDB instance using oplog replay alongside mitigate connection switch latency with existing utilities.]]></description><link>https://www.loginradius.com/blog/engineering/live-data-migration-mongodb/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/live-data-migration-mongodb/</guid><category><![CDATA[MongoDB]]></category><dc:creator><![CDATA[Chinmaya Pati]]></dc:creator><pubDate>Mon, 14 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/358a76df2469bd65a47d7ec0a70675d7/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article covers the guide to migrate data from offline or live MongoDB instance using oplog replay alongside mitigate connection switch latency with existing utilities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/live-data-migration-mongodb/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/cnp96.png?size=100v=40</authorImage></item><item><title><![CDATA[Login Security: 7 Best Practice to Keep Your Online Accounts Secure]]></title><description><![CDATA[In reality, there are so many mistakes that can make your account vulnerable to cyber attacks. Hackers can read your email, steal money out of your bank account, or sell your data in the dark web. Therefore you need to eliminate as many vulnerabilities as possible to keep your login safe.]]></description><link>https://www.loginradius.com/blog/identity/login-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/login-security/</guid><category><![CDATA[data security]]></category><category><![CDATA[login security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 11 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8a79b4f10ed256e387cfa03b86849f73/c0524/login-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In reality, there are so many mistakes that can make your account vulnerable to cyber attacks. Hackers can read your email, steal money out of your bank account, or sell your data in the dark web. Therefore you need to eliminate as many vulnerabilities as possible to keep your login safe. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/login-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Guide To React User Authentication with LoginRadius]]></title><description><![CDATA[This article focuses on helping developers learn how to integrate user authentication in React applications and determine the basic principles of authentication with React.]]></description><link>https://www.loginradius.com/blog/engineering/user-authentication-react-application/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/user-authentication-react-application/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[LoginRadius]]></category><category><![CDATA[React]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Thu, 10 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a877f5fa04ac6dd24b63bb101cc8302d/58556/authentication-main.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article focuses on helping developers learn how to integrate user authentication in React applications and determine the basic principles of authentication with React. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/user-authentication-react-application/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[WebAuthn: A Guide To Authenticate Your Application]]></title><description><![CDATA[Web authentication, or WebAuthn in short. A go-to guide for developers to learn more about WebAuthn API, and how to set it up in their services..]]></description><link>https://www.loginradius.com/blog/engineering/webauthn-authentication-application/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/webauthn-authentication-application/</guid><category><![CDATA[WebAuthn]]></category><category><![CDATA[FIDO]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Chris Yee]]></dc:creator><pubDate>Wed, 09 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/23998a17044eadfc099cb67908b28ac8/58556/webauthn-logo.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Web authentication, or WebAuthn in short. A go-to guide for developers to learn more about WebAuthn API, and how to set it up in their services.. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/webauthn-authentication-application/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Yee&amp;size=100</authorImage></item><item><title><![CDATA[9 Data Security Best Practices For your Business]]></title><description><![CDATA[Confining data security best practices to the organization's size never helped in the past, nor will it work in the future. What cybercriminals gain is what consumers lose, and those losses add up.]]></description><link>https://www.loginradius.com/blog/identity/data-security-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-security-best-practices/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 09 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9c61a0a85e0cfb68478ba317c9ae6d63/176df/9-data-security-best-practices-for-2021.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Confining data security best practices to the organization&apos;s size never helped in the past, nor will it work in the future. What cybercriminals gain is what consumers lose, and those losses add up. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-security-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Make Sure Your Phone Isn’t Hacked]]></title><description><![CDATA[Hacking your smartphone may feel like someone has stolen your home. Go through this checklist to protect your phone from being hacked.]]></description><link>https://www.loginradius.com/blog/identity/how-to-stop-phone-hacking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-to-stop-phone-hacking/</guid><category><![CDATA[data security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 09 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/250c92b546f453c29b1dce8eb7e108a3/7f8e9/stop-phone-hacking.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hacking your smartphone may feel like someone has stolen your home. Go through this checklist to protect your phone from being hacked. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-to-stop-phone-hacking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Build and Push Docker Images with Go]]></title><description><![CDATA[Guide on how to build and push Docker images programmatically using Go.]]></description><link>https://www.loginradius.com/blog/engineering/build-push-docker-images-golang/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/build-push-docker-images-golang/</guid><category><![CDATA[Docker]]></category><category><![CDATA[Go]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Tue, 08 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2f998a173a852a0b3670b1ac58fba74e/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Guide on how to build and push Docker images programmatically using Go. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/build-push-docker-images-golang/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Istio Service Mesh: A Beginners Guide]]></title><description><![CDATA[This post will give a high-level introduction to Istio and its related concepts and terminologies.]]></description><link>https://www.loginradius.com/blog/engineering/istio-service-mesh/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/istio-service-mesh/</guid><category><![CDATA[Istio]]></category><category><![CDATA[Service Mesh]]></category><dc:creator><![CDATA[Piyush Kumar]]></dc:creator><pubDate>Mon, 07 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8ff8c7b29395837a840c4013f351290/58556/Istio.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This post will give a high-level introduction to Istio and its related concepts and terminologies. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/istio-service-mesh/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/kpiyush17.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Perform a Git Force Pull]]></title><description><![CDATA[How to Overwrite Local Changes With Git Force Pull]]></description><link>https://www.loginradius.com/blog/engineering/git-pull-force/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/git-pull-force/</guid><category><![CDATA[git]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Thu, 03 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9cea373b830a55754969545351066e3/58556/pull.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How to Overwrite Local Changes With Git Force Pull &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/git-pull-force/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Safe Data Act: A New Privacy Law in the Town]]></title><description><![CDATA[The Safe Data Act follows the footsteps of the 2019 draught, but makes a few major changes to the threats of people in the United States to privacy, cybersecurity, and compliance.]]></description><link>https://www.loginradius.com/blog/identity/safe-data-act/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/safe-data-act/</guid><category><![CDATA[privacy-and-compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 03 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/212151ad2baaffca41073b6e173b4ed5/176df/safe-data-act-privacy-law.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The Safe Data Act follows the footsteps of the 2019 draught, but makes a few major changes to the threats of people in the United States to privacy, cybersecurity, and compliance. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/safe-data-act/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Email is Hacked!: 7 Immediate Steps To Follow]]></title><description><![CDATA[The golden terms for a hacker to access your personal information and get access to all your accounts are hacked emails. Recovery from a hack is extremely time-sensitive, as our emails connect everything from online banking to other online portals. You'll have to move quickly and cautiously if you want to minimise the damage to your identity, finances and protect those around you.]]></description><link>https://www.loginradius.com/blog/identity/what-to-do-when-email-hacked/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-to-do-when-email-hacked/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 03 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fda08c5b4fd2ca2e170b10713d9acfa7/176df/what-to-do-when-email-is-hacked.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The golden terms for a hacker to access your personal information and get access to all your accounts are hacked emails. Recovery from a hack is extremely time-sensitive, as our emails connect everything from online banking to other online portals. You&apos;ll have to move quickly and cautiously if you want to minimise the damage to your identity, finances and protect those around you. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-to-do-when-email-hacked/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Smart and IoT Authentication to Offer Hassle-Free Login for Input-Constrained Devices]]></title><description><![CDATA[Smart and IoT Authentication from LoginRadius is a realistic solution to ensure customers are securely logged in. It removes the password entry burden and as a result, eliminates data protection threats related to password attacks.]]></description><link>https://www.loginradius.com/blog/identity/iot-smart-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/iot-smart-authentication/</guid><category><![CDATA[authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 02 Dec 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/82259541c8c8a3b14506076767a7bec3/c0524/loginradius-iot-smart-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Smart and IoT Authentication from LoginRadius is a realistic solution to ensure customers are securely logged in. It removes the password entry burden and as a result, eliminates data protection threats related to password attacks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/iot-smart-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[NodeJS Server using Core HTTP Module]]></title><description><![CDATA[Let us understand the core http module in NodeJS, which is the basic building block of frameworks like ExpressJS etc.]]></description><link>https://www.loginradius.com/blog/engineering/node-http-module-server/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/node-http-module-server/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Hridayesh Sharma]]></dc:creator><pubDate>Fri, 27 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8d8c41d9ba7fce1f1b5c6d72e0982463/58556/coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Let us understand the core http module in NodeJS, which is the basic building block of frameworks like ExpressJS etc. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/node-http-module-server/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/vyasriday.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Announces Authentication and SSO for Native Mobile Apps]]></title><description><![CDATA[Both companies and their customers benefit from LoginRadius Native Mobile SDKs. It allows companies to build and deploy seamless authentication and SSO functionality, while stable, easy and improved customer experiences are on-the-go for later.]]></description><link>https://www.loginradius.com/blog/identity/authentication-sso-native-mobile-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-sso-native-mobile-apps/</guid><category><![CDATA[authentication]]></category><category><![CDATA[SSO]]></category><category><![CDATA[data security]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 25 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8c8ffd0c6ed83c98752197b249def1d1/c0524/loginradius-mobile-native-app.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Both companies and their customers benefit from LoginRadius Native Mobile SDKs. It allows companies to build and deploy seamless authentication and SSO functionality, while stable, easy and improved customer experiences are on-the-go for later. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-sso-native-mobile-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How does bitwise ^ (XOR) work?]]></title><description><![CDATA[Everything you should know about bitwise ^ xor operator.]]></description><link>https://www.loginradius.com/blog/engineering/how-does-bitwise-xor-work/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-does-bitwise-xor-work/</guid><category><![CDATA[bitwise]]></category><category><![CDATA[XOR]]></category><dc:creator><![CDATA[Kheenvraj Lomror]]></dc:creator><pubDate>Tue, 24 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3dc791a9bfecb4dc03ef8263118ccf7d/58556/xor.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Everything you should know about bitwise ^ xor operator. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-does-bitwise-xor-work/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/rajlomror.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to Redux Saga]]></title><description><![CDATA[A high level introduction to Redux Saga.]]></description><link>https://www.loginradius.com/blog/engineering/introduction-to-redux-saga/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-to-redux-saga/</guid><category><![CDATA[React]]></category><category><![CDATA[Redux]]></category><category><![CDATA[Redux Saga]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Mon, 23 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4fec246c146752a9eaa62241dbbe219f/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A high level introduction to Redux Saga. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-to-redux-saga/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[React Router Basics: Routing in a Single-page Application]]></title><description><![CDATA[Everything essential you need to know about React Router.]]></description><link>https://www.loginradius.com/blog/engineering/react-router-basics/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-router-basics/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[Node]]></category><category><![CDATA[React]]></category><category><![CDATA[React Router]]></category><dc:creator><![CDATA[Nathan Nguyen]]></dc:creator><pubDate>Fri, 20 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4bcd64f320b4486ea6ddb7147ff85a96/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Everything essential you need to know about React Router. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-router-basics/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/nathannguyenn.png?size=100v=40</authorImage></item><item><title><![CDATA[How to send emails in C#/.NET using SMTP]]></title><description><![CDATA[ In this article, we will learn how to send emails in .NET/C# using SMTP]]></description><link>https://www.loginradius.com/blog/engineering/how-to-send-emails-through-csharp-dotnet-using-smtp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-send-emails-through-csharp-dotnet-using-smtp/</guid><category><![CDATA[.NET]]></category><category><![CDATA[C#]]></category><category><![CDATA[SMTP]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0def756cf8634c19ffe25f2d6fc37dbd/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  In this article, we will learn how to send emails in .NET/C# using SMTP &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-send-emails-through-csharp-dotnet-using-smtp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[How to create an EC2 Instance in AWS]]></title><description><![CDATA[Learn how to create an EC2 (Elastic Compute Cloud) instance in an AWS account in simple and straightforward steps.]]></description><link>https://www.loginradius.com/blog/engineering/ec2-instance-aws/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/ec2-instance-aws/</guid><category><![CDATA[AWS]]></category><category><![CDATA[DevOps]]></category><category><![CDATA[EC2]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Wed, 18 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8663624ccdd85c88db0a127028ee564/58556/ec2cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to create an EC2 (Elastic Compute Cloud) instance in an AWS account in simple and straightforward steps. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/ec2-instance-aws/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[How to use Git Cherry Pick]]></title><description><![CDATA[Introduction to Git Cherry-pick and its usages.]]></description><link>https://www.loginradius.com/blog/engineering/git-cherry-pick/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/git-cherry-pick/</guid><category><![CDATA[git]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Tue, 17 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7cc5358c073674d856e8ea5cddc47710/58556/cherrypck.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Introduction to Git Cherry-pick and its usages. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/git-cherry-pick/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Password Security Best Practices & Compliance]]></title><link>https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/</guid><category><![CDATA[Security]]></category><category><![CDATA[Password]]></category><category><![CDATA[Compliance]]></category><category><![CDATA[Passowrd Policy]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Thu, 12 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4e0affaac848158a3cb23d1551a0076e/58556/password-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Application Security is one of the primary concerns for a software developer. People trust your application and share sensitive or personal information. As a software developer, you need to take care of your application user information security. Authentication and authorization… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[9 Identity and Access Management Best Practices for 2021]]></title><description><![CDATA[Enforcing best practices for identity and access management allows you to know who can access the confidential data and under what conditions they can access it. You will need a detailed overview of the IT infrastructure of your company so that you can track all of your components for future and current threats.]]></description><link>https://www.loginradius.com/blog/identity/identity-access-management-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-access-management-best-practices/</guid><category><![CDATA[identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 11 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56c970eaba7255b7315184d89803b959/176df/Identity-and-Access-Management-Best-Practices.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Enforcing best practices for identity and access management allows you to know who can access the confidential data and under what conditions they can access it. You will need a detailed overview of the IT infrastructure of your company so that you can track all of your components for future and current threats. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-access-management-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Using PGP Encryption with Nodejs]]></title><description><![CDATA[Starter guide on Pretty Good Privacy(PGP) with Nodejs. PGP, a cryptographic process used to encrypt and decrypt information.]]></description><link>https://www.loginradius.com/blog/engineering/using-pgp-encryption-with-nodejs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/using-pgp-encryption-with-nodejs/</guid><category><![CDATA[Security]]></category><category><![CDATA[NodeJs]]></category><category><![CDATA[Encryption]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Tue, 10 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/17b7404342f677f5ecd47557fd49ab6f/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Starter guide on Pretty Good Privacy(PGP) with Nodejs. PGP, a cryptographic process used to encrypt and decrypt information. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/using-pgp-encryption-with-nodejs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Python basics in minutes]]></title><description><![CDATA[Learn the basics of Python programming lanuage (For Beginners)]]></description><link>https://www.loginradius.com/blog/engineering/python-basics-in-minutes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/python-basics-in-minutes/</guid><category><![CDATA[Python]]></category><dc:creator><![CDATA[Sara Lins]]></dc:creator><pubDate>Fri, 06 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e65362be2b3196aeea5b79ea97dab3a6/58556/python.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn the basics of Python programming lanuage (For Beginners) &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/python-basics-in-minutes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/saranicoly.png?size=100v=40</authorImage></item><item><title><![CDATA[E-commerce Security: 5 Ways to Enhance Data Protection During the Shopping Season]]></title><description><![CDATA[Security for e-commerce is a series of protocols that guarantee protected internet transactions. Major data violations have significantly eroded trust in digital security. Via common networks, consumers are comfortable making purchases. However, when it comes to sharing their credit card details with new businesses, they need a little more convincing.]]></description><link>https://www.loginradius.com/blog/identity/ecommerce-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ecommerce-security/</guid><category><![CDATA[ecommerce security]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Fri, 06 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/55e22a56a55fa650f913014c544f8b18/176df/ecommerce-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security for e-commerce is a series of protocols that guarantee protected internet transactions. Major data violations have significantly eroded trust in digital security. Via common networks, consumers are comfortable making purchases. However, when it comes to sharing their credit card details with new businesses, they need a little more convincing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ecommerce-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Automating Rest API's using Cucumber and Java]]></title><description><![CDATA[This article is about basic overview of how to automate Rest API using Cucumber and JAVA.]]></description><link>https://www.loginradius.com/blog/engineering/rest-api-cucumber-blog/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/rest-api-cucumber-blog/</guid><category><![CDATA[Automation]]></category><category><![CDATA[Cucumber]]></category><category><![CDATA[Rest API]]></category><category><![CDATA[Java]]></category><dc:creator><![CDATA[Surendranath Reddy Birudala]]></dc:creator><pubDate>Thu, 05 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1775ed5790237a2d1ac5fbda108bc357/58556/cucumber_rest_assured.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article is about basic overview of how to automate Rest API using Cucumber and JAVA. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/rest-api-cucumber-blog/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/reddysuren.png?size=100v=40</authorImage></item><item><title><![CDATA[Bluetooth Controlled Arduino Car Miniature]]></title><description><![CDATA[In this blog, you will learn how to make a Bluetooth controlled Arduino Car.]]></description><link>https://www.loginradius.com/blog/engineering/bluetooth-controlled-arduino-car-miniature/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/bluetooth-controlled-arduino-car-miniature/</guid><category><![CDATA[Arduino]]></category><category><![CDATA[Bluetooth]]></category><dc:creator><![CDATA[Abhishek Potekar]]></dc:creator><pubDate>Wed, 04 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/97e8b7b803bfeda226780dd055369351/58556/Arduinocar.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, you will learn how to make a Bluetooth controlled Arduino Car. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/bluetooth-controlled-arduino-car-miniature/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/Madmaxcoder2612.png?size=100v=40</authorImage></item><item><title><![CDATA[AWS Services-Walkthrough]]></title><description><![CDATA[Learn about various AWS services and how to set up in a step by step tutorial.]]></description><link>https://www.loginradius.com/blog/engineering/a-journey-with-aws/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/a-journey-with-aws/</guid><category><![CDATA[AWS]]></category><category><![CDATA[Serverless]]></category><dc:creator><![CDATA[Nitin Gupta]]></dc:creator><pubDate>Tue, 03 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/78050f048f7ab8ee8ffbdfdb9cfbee1a/58556/aws.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about various AWS services and how to set up in a step by step tutorial. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/a-journey-with-aws/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/ng29.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity Management in Healthcare: Analyzing the Industry Needs]]></title><description><![CDATA[Healthcare is one of the most heavily regulated sectors in existence, mostly because of the sensitivity of the collected data. Patients expect that their data remain confidential, and they enjoy a quality experience. Employing identity management in healthcare can genuinely make all the difference]]></description><link>https://www.loginradius.com/blog/identity/identity-management-healthcare/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-management-healthcare/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 03 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a00f685dcee491f01d49796d9bbedc06/176df/Identity-Management-in-Healthcare.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Healthcare is one of the most heavily regulated sectors in existence, mostly because of the sensitivity of the collected data. Patients expect that their data remain confidential, and they enjoy a quality experience. Employing identity management in healthcare can genuinely make all the difference &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-management-healthcare/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Beginners Guide to Tweepy ]]></title><description><![CDATA[Learn how to use Twitter APIs using Tweepy, a python package,]]></description><link>https://www.loginradius.com/blog/engineering/beginners-guide-to-tweepy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/beginners-guide-to-tweepy/</guid><category><![CDATA[Twitter]]></category><category><![CDATA[Tweepy]]></category><category><![CDATA[Python]]></category><dc:creator><![CDATA[Sameer Mahajan]]></dc:creator><pubDate>Mon, 02 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f706bedc2cff52e9c0f73c8e799ee39c/58556/coverimage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to use Twitter APIs using Tweepy, a python package, &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/beginners-guide-to-tweepy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/sameermahajan101.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to Github APIs]]></title><description><![CDATA[Github APIs are a way to interact with Github. Here, we will learn about some basic things we can do with Github APIs.]]></description><link>https://www.loginradius.com/blog/engineering/github-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/github-api/</guid><category><![CDATA[Github]]></category><category><![CDATA[API]]></category><dc:creator><![CDATA[Kapil Bansal]]></dc:creator><pubDate>Mon, 02 Nov 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9b0ec78bfd1a3c9406386c61f5dcb8c4/58556/GitHub_coverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Github APIs are a way to interact with Github. Here, we will learn about some basic things we can do with Github APIs. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/github-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/devkapilbansal.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to Android Studio]]></title><description><![CDATA[Getting Started with Android Studio and making your first app.]]></description><link>https://www.loginradius.com/blog/engineering/introduction-to-android-studio/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-to-android-studio/</guid><category><![CDATA[Android Studio]]></category><category><![CDATA[Android App]]></category><dc:creator><![CDATA[Prithviraj Biswas]]></dc:creator><pubDate>Fri, 30 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c917e805c15a131fd63af0849f3c5811/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Getting Started with Android Studio and making your first app. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-to-android-studio/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/prithvirajbytes.png?size=100v=40</authorImage></item><item><title><![CDATA[Login Screen - Tips and Ideas for Testing]]></title><description><![CDATA[Login process is the most important feature for any system/application as it provides access to an entire web-site/application or part of it. This article is providing you with some important tips & ideas about login testing.]]></description><link>https://www.loginradius.com/blog/engineering/loginscreen-testing-tips/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/loginscreen-testing-tips/</guid><category><![CDATA[LoginScreen]]></category><category><![CDATA[TestingTips]]></category><dc:creator><![CDATA[Sudhey Sharma]]></dc:creator><pubDate>Fri, 30 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d2f02e6f83261e65c59df537735d0919/58556/CoverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Login process is the most important feature for any system/application as it provides access to an entire web-site/application or part of it. This article is providing you with some important tips &amp; ideas about login testing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/loginscreen-testing-tips/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/sudheysharma.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to JAMstack]]></title><description><![CDATA[You may have heard the term JAMstack before, but you may not have understood what it means. In this article, We will introduce you to JAMstack as to why you need, best practice, and value.]]></description><link>https://www.loginradius.com/blog/engineering/jamstack-introduction/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/jamstack-introduction/</guid><category><![CDATA[Jamstack]]></category><category><![CDATA[Web]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/974b16bfa06f1616aaee042b80b7a90c/58556/jamstack_cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; You may have heard the term JAMstack before, but you may not have understood what it means. In this article, We will introduce you to JAMstack as to why you need, best practice, and value. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/jamstack-introduction/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[A Quick Look at the React Speech Recognition Hook]]></title><description><![CDATA[Learning and exploring the react-speech-recognition hook basics.]]></description><link>https://www.loginradius.com/blog/engineering/quick-look-at-react-speech-recognition/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/quick-look-at-react-speech-recognition/</guid><category><![CDATA[React]]></category><category><![CDATA[React Speech Recognition]]></category><category><![CDATA[React Speech]]></category><category><![CDATA[React Hook]]></category><dc:creator><![CDATA[Krista Singleton]]></dc:creator><pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e24959f3fecbc8a550a2b050cbfcba69/58556/mic.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learning and exploring the react-speech-recognition hook basics. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/quick-look-at-react-speech-recognition/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/krissingl.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity Management for Developers: Why it's required more than ever]]></title><description><![CDATA[Identity management for developers isn't a tough nut to crack, especially if you know how to play your cards right. As a creator of front-end or back-end applications, you will eventually experience the need to collect and store consumer information like their identities and other profile details. Learning the basics of identity management for developers can place you in a strong position to communicate what you need and why.]]></description><link>https://www.loginradius.com/blog/identity/identity-management-developers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-management-developers/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/300bad31f0b8b26c9733705acd1f030a/7f8e9/Identity-Management-for-Developers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity management for developers isn&apos;t a tough nut to crack, especially if you know how to play your cards right. As a creator of front-end or back-end applications, you will eventually experience the need to collect and store consumer information like their identities and other profile details. Learning the basics of identity management for developers can place you in a strong position to communicate what you need and why. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-management-developers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Launches Passwordless Login with Magic Link or OTP, Keeps Barriers Low During Registration and Login]]></title><description><![CDATA[The problem with passwords is that they can be guessed, hacked, or coerced out of consumers through social engineering attacks. So, why not eliminate the main source of insecurity by going passwordless?]]></description><link>https://www.loginradius.com/blog/identity/loginradius-launches-passwordless-login-with-magic-link-or-otp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-launches-passwordless-login-with-magic-link-or-otp/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f9626b12256083c953eaa239cdc22f83/c0524/DS-Login-with-Magic-Link-or-OTP.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The problem with passwords is that they can be guessed, hacked, or coerced out of consumers through social engineering attacks. So, why not eliminate the main source of insecurity by going passwordless? &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-launches-passwordless-login-with-magic-link-or-otp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[IoT and AI - The Perfect Match]]></title><description><![CDATA[AI and IOT are very popular these days. Let's understand Why IoT and AI together make the perfect match!]]></description><link>https://www.loginradius.com/blog/engineering/ai-and-iot-the-perfect-match/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/ai-and-iot-the-perfect-match/</guid><category><![CDATA[AI]]></category><category><![CDATA[IOT]]></category><dc:creator><![CDATA[Devansh Agarwal]]></dc:creator><pubDate>Wed, 28 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4bd8041b0f244c0e88595ae6c56be11d/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; AI and IOT are very popular these days. Let&apos;s understand Why IoT and AI together make the perfect match! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/ai-and-iot-the-perfect-match/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/Devanshh.png?size=100v=40</authorImage></item><item><title><![CDATA[A Simple CSS3 Accordion Tutorial]]></title><description><![CDATA[Learn how to make a beautiful accordion with HTML and CSS only]]></description><link>https://www.loginradius.com/blog/engineering/css3-accordion/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/css3-accordion/</guid><category><![CDATA[CSS]]></category><category><![CDATA[Accordion]]></category><category><![CDATA[UI]]></category><dc:creator><![CDATA[Isaac Anohene]]></dc:creator><pubDate>Tue, 27 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d2e82b3c0d7035834b8a286f51bb8fa8/58556/cover-accordion.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to make a beautiful accordion with HTML and CSS only &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/css3-accordion/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/anohene1.png?size=100v=40</authorImage></item><item><title><![CDATA[EternalBlue: A retrospective on one of the biggest Windows exploits ever]]></title><description><![CDATA[It's been more than three years since EternalBlue; let's do a recap.]]></description><link>https://www.loginradius.com/blog/engineering/eternal-blue-retrospective/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/eternal-blue-retrospective/</guid><category><![CDATA[Cyber Security]]></category><category><![CDATA[Exploits]]></category><category><![CDATA[Virus]]></category><dc:creator><![CDATA[Anonymous]]></dc:creator><pubDate>Tue, 27 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/79a8a4af9dfefb08277f2033020505b7/58556/etbluecover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It&apos;s been more than three years since EternalBlue; let&apos;s do a recap. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/eternal-blue-retrospective/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Anonymous&amp;size=100</authorImage></item><item><title><![CDATA[Setup a blog in minutes with Jekyll & Github]]></title><description><![CDATA[Getting started with Jekyll & Github pages]]></description><link>https://www.loginradius.com/blog/engineering/setup-blog-in-minutes-with-jekyll/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/setup-blog-in-minutes-with-jekyll/</guid><category><![CDATA[jekyll]]></category><category><![CDATA[blogging]]></category><category><![CDATA[blog]]></category><category><![CDATA[github-pages]]></category><dc:creator><![CDATA[Malathi T]]></dc:creator><pubDate>Mon, 26 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4c39b8cf22b319a7c32f6351ea746be2/58556/jekyll-github-pages.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Getting started with Jekyll &amp; Github pages &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/setup-blog-in-minutes-with-jekyll/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/malathit.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Kubernetes? - A Basic Guide]]></title><description><![CDATA[Learn about the Kubernetes. A container Orchestration tool on a basic level, and how it is making the job of Developers simpler.]]></description><link>https://www.loginradius.com/blog/engineering/understanding-kubernetes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/understanding-kubernetes/</guid><category><![CDATA[Kubernetes]]></category><category><![CDATA[Deployment]]></category><category><![CDATA[Distributed Systems]]></category><dc:creator><![CDATA[Prabhat Kumar]]></dc:creator><pubDate>Mon, 26 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/17636a7b563db424ef3300fe9aed0477/58556/image3.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the Kubernetes. A container Orchestration tool on a basic level, and how it is making the job of Developers simpler. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/understanding-kubernetes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/prabhatkgupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Why RPA is important for businesses]]></title><description><![CDATA[It's very important for every business to evolve with technologies, understand their customers needs and and market senitment to sustain and grow.This article will give you some insights that how RPA can help in that with different industries/domain.]]></description><link>https://www.loginradius.com/blog/engineering/importance-of-rpa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/importance-of-rpa/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[RPA]]></category><category><![CDATA[Automation]]></category><dc:creator><![CDATA[Vikram Jain]]></dc:creator><pubDate>Fri, 23 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bf3c8e9f6887242b7e9e77c12054a934/58556/RPA.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It&apos;s very important for every business to evolve with technologies, understand their customers needs and and market senitment to sustain and grow.This article will give you some insights that how RPA can help in that with different industries/domain. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/importance-of-rpa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vikram Jain&amp;size=100</authorImage></item><item><title><![CDATA[Best Hacking Tools]]></title><description><![CDATA[Learn about the basic hacking tools.]]></description><link>https://www.loginradius.com/blog/engineering/best-hacking-tools/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/best-hacking-tools/</guid><category><![CDATA[Ethical Hacking]]></category><category><![CDATA[Security]]></category><category><![CDATA[Testing]]></category><dc:creator><![CDATA[Akshay Nagle]]></dc:creator><pubDate>Thu, 22 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2ee3fb0f028bf5c1449727036095e60e/58556/cover1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the basic hacking tools. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/best-hacking-tools/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/Akshay-Nagle.png?size=100v=40</authorImage></item><item><title><![CDATA[Three Ways to do CRUD Operations On Redis]]></title><description><![CDATA[Start working with Redis in three different ways.]]></description><link>https://www.loginradius.com/blog/engineering/three-ways-to-do-crud-operations-on-redis/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/three-ways-to-do-crud-operations-on-redis/</guid><category><![CDATA[Redis]]></category><category><![CDATA[NodeJs]]></category><category><![CDATA[CLI]]></category><category><![CDATA[GUI]]></category><dc:creator><![CDATA[Chris Yee]]></dc:creator><pubDate>Wed, 21 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6597d1ce622532f445baf8ba0ef6e846/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Start working with Redis in three different ways. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/three-ways-to-do-crud-operations-on-redis/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Yee&amp;size=100</authorImage></item><item><title><![CDATA[Traversing the realms of Quantum Network]]></title><description><![CDATA[Basic structure and knowledge of Quantum Networking and how it can change the field of technology.]]></description><link>https://www.loginradius.com/blog/engineering/traversing-the-realms-of-quantum-network/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/traversing-the-realms-of-quantum-network/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Quantum]]></category><category><![CDATA[Networking]]></category><dc:creator><![CDATA[Devansh Markan]]></dc:creator><pubDate>Wed, 21 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8459690001b75921346b6ed8be6b0572/58556/quantum_comp_FB.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Basic structure and knowledge of Quantum Networking and how it can change the field of technology. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/traversing-the-realms-of-quantum-network/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/markandevansh99.png?size=100v=40</authorImage></item><item><title><![CDATA[How to make a telegram bot]]></title><description><![CDATA[What is a bot and How to make our own Telegram bot.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-make-telegram-bot/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-make-telegram-bot/</guid><category><![CDATA[Telegram Bot]]></category><category><![CDATA[Python]]></category><dc:creator><![CDATA[Rajan Puri]]></dc:creator><pubDate>Tue, 20 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/aceaa6a49195f6d0417cb80f93f56be4/58556/bot.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is a bot and How to make our own Telegram bot. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-make-telegram-bot/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/rjn01.png?size=100v=40</authorImage></item><item><title><![CDATA[iOS App Development: How To Make Your First App]]></title><description><![CDATA[I will guide you through the best approach to learning how to develop iOS apps in this post, so you can build and publish your own iOS apps from scratch.]]></description><link>https://www.loginradius.com/blog/engineering/getting-started-with-ios-app-development/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/getting-started-with-ios-app-development/</guid><category><![CDATA[ios]]></category><category><![CDATA[swift]]></category><category><![CDATA[xcode]]></category><category><![CDATA[mac]]></category><dc:creator><![CDATA[Tanvi Jain]]></dc:creator><pubDate>Mon, 19 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dde63430f9de95dd6a3ca8d01bdc5f00/58556/CoverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; I will guide you through the best approach to learning how to develop iOS apps in this post, so you can build and publish your own iOS apps from scratch. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/getting-started-with-ios-app-development/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/tanvijn.png?size=100v=40</authorImage></item><item><title><![CDATA[Apache Beam: A Basic Guide]]></title><description><![CDATA[Apache Beam simplifies large-scale data processing dynamics. Let’s read more about the features, basic concepts, and the fundamentals of Apache beam.]]></description><link>https://www.loginradius.com/blog/engineering/apache-beam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/apache-beam/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Big Data]]></category><category><![CDATA[Streaming]]></category><category><![CDATA[Apache Beam]]></category><category><![CDATA[Java]]></category><dc:creator><![CDATA[Abhilash K R]]></dc:creator><pubDate>Fri, 16 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8afbe1aebda6504f38c81e81dee39f35/58556/main.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Apache Beam simplifies large-scale data processing dynamics. Let’s read more about the features, basic concepts, and the fundamentals of Apache beam. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/apache-beam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/Better-Boy.png?size=100v=40</authorImage></item><item><title><![CDATA[Python Virtual Environment: What is it and how it works?]]></title><description><![CDATA[We'll cover the basics of virtual environments in this guide and how to use them. We will then take a closer look at how virtual environments actually work.]]></description><link>https://www.loginradius.com/blog/engineering/python-virtual-environments/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/python-virtual-environments/</guid><category><![CDATA[Python]]></category><dc:creator><![CDATA[Ashish Maharjan]]></dc:creator><pubDate>Fri, 16 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/674ce17a9dc4e13f0616a1fd935bc596/58556/python.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We&apos;ll cover the basics of virtual environments in this guide and how to use them. We will then take a closer look at how virtual environments actually work. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/python-virtual-environments/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/AshishMhrzn10.png?size=100v=40</authorImage></item><item><title><![CDATA[End-to-End Testing with Jest and Puppeteer]]></title><description><![CDATA[Learn how to integrate Jest and Puppeteer in your project for End-to-End Testing.]]></description><link>https://www.loginradius.com/blog/engineering/e2e-testing-with-jest-puppeteer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/e2e-testing-with-jest-puppeteer/</guid><category><![CDATA[Testing]]></category><category><![CDATA[Jest]]></category><category><![CDATA[Puppeteer]]></category><dc:creator><![CDATA[Shreya Sharma]]></dc:creator><pubDate>Thu, 15 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/eac53dcd5bac1a253375e85170c64e4e/c622d/jest-puppeteer.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to integrate Jest and Puppeteer in your project for End-to-End Testing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/e2e-testing-with-jest-puppeteer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/cypherean.png?size=100v=40</authorImage></item><item><title><![CDATA[Speed Up Python Code]]></title><description><![CDATA[Learn a few ways to speed up your python code.]]></description><link>https://www.loginradius.com/blog/engineering/speed-up-python-code/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/speed-up-python-code/</guid><category><![CDATA[Python]]></category><category><![CDATA[Performance]]></category><dc:creator><![CDATA[Md. Tahmid Hossain]]></dc:creator><pubDate>Thu, 15 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/65558b9da57861b919205b297c81828b/58556/speed-up-python-code-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn a few ways to speed up your python code. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/speed-up-python-code/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/tahmid02016.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Simplifies the Implementation of Federated SSO With Federated Identity Management]]></title><description><![CDATA[Our Federated Identity Management feature is designed to simplify the implementation of Federated SSO, so consumers now do not need to create multiple accounts for multiple organisations to access their web applications.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-federated-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-federated-identity-management/</guid><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 15 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/534a4b5eecf3cee2ae1e2a3bb871feeb/7f8e9/fim-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Our Federated Identity Management feature is designed to simplify the implementation of Federated SSO, so consumers now do not need to create multiple accounts for multiple organisations to access their web applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-federated-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Build A Twitter Bot Using NodeJS]]></title><description><![CDATA[Learn how to create a twitter bot using NodeJS that let us tweet using the command line directly]]></description><link>https://www.loginradius.com/blog/engineering/build-a-twitter-bot-using-nodejs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/build-a-twitter-bot-using-nodejs/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[Twitter]]></category><category><![CDATA[Bot]]></category><dc:creator><![CDATA[Vineeta Jain]]></dc:creator><pubDate>Wed, 14 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/820019d481163bc17d6c095404abb359/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to create a twitter bot using NodeJS that let us tweet using the command line directly &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/build-a-twitter-bot-using-nodejs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/Ninjavin.png?size=100v=40</authorImage></item><item><title><![CDATA[Visualizing Data using Leaflet and Netlify]]></title><description><![CDATA[Let's visualize geospatial data on the web using Leaflet and host it on Netlify!]]></description><link>https://www.loginradius.com/blog/engineering/visualizing-data-using-leaflet-and-netlify/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/visualizing-data-using-leaflet-and-netlify/</guid><category><![CDATA[GIS]]></category><category><![CDATA[Serverless]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Sudipto Ghosh]]></dc:creator><pubDate>Wed, 14 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f09ca52cdb62e663db2958fa17ee7f4a/58556/map.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Let&apos;s visualize geospatial data on the web using Leaflet and host it on Netlify! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/visualizing-data-using-leaflet-and-netlify/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/sudiptog81.png?size=100v=40</authorImage></item><item><title><![CDATA[Secure Enclave in iOS App]]></title><description><![CDATA[SecureEnclaveDemo is an xcode project containing helper named as SecEnclaveWrapper. You can use this wrapper in your project to encrypt/decrypt sensitive data using Secure Enclave. Let's understand more about in the blog.]]></description><link>https://www.loginradius.com/blog/engineering/secure-enclave-ios-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/secure-enclave-ios-app/</guid><category><![CDATA[ios]]></category><category><![CDATA[security]]></category><category><![CDATA[data]]></category><category><![CDATA[encryption]]></category><category><![CDATA[private key]]></category><category><![CDATA[xcode]]></category><dc:creator><![CDATA[Tanvi Jain]]></dc:creator><pubDate>Tue, 13 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e677a934323b29af4619ee797f0286b8/58556/CoverImage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SecureEnclaveDemo is an xcode project containing helper named as SecEnclaveWrapper. You can use this wrapper in your project to encrypt/decrypt sensitive data using Secure Enclave. Let&apos;s understand more about in the blog. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/secure-enclave-ios-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/tanvijn.png?size=100v=40</authorImage></item><item><title><![CDATA[STL Containers & Data Structures in C++]]></title><description><![CDATA[Learn how Standard Template Library works in C++ with interactive examples and what you need to get started]]></description><link>https://www.loginradius.com/blog/engineering/cpp-stl-containers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/cpp-stl-containers/</guid><category><![CDATA[C++]]></category><category><![CDATA[STL]]></category><dc:creator><![CDATA[Aryan Rawlani]]></dc:creator><pubDate>Tue, 13 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4ec0001784cd81b020aea7e2bbf26abb/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how Standard Template Library works in C++ with interactive examples and what you need to get started &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/cpp-stl-containers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/aryanrawlani28.png?size=100v=40</authorImage></item><item><title><![CDATA[Optimal clusters for KMeans Algorithm]]></title><link>https://www.loginradius.com/blog/engineering/optimal-clusters-kmeans/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/optimal-clusters-kmeans/</guid><category><![CDATA[Machine Learning]]></category><dc:creator><![CDATA[Neeraj Ap]]></dc:creator><pubDate>Mon, 12 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/225782b978d81111592f1f839c6dc1e4/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Before we get into details of finding out optimal clusters, let&apos;s first see what the KMeans clustering algorithm is and some basics about it. What is Clustering? Clustering is an unsupervised ML technique wherein we cluster the data to get insights from it. Clustering the data is… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/optimal-clusters-kmeans/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/NEERAJAP2001.png?size=100v=40</authorImage></item><item><title><![CDATA[Upload files using NodeJS + Multer]]></title><description><![CDATA[Learn how to upload files in a NodeJS application using Multer, Multer is a middleware for handling multipart/form-data that is used to send files in forms.]]></description><link>https://www.loginradius.com/blog/engineering/upload-files-with-node-and-multer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/upload-files-with-node-and-multer/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[Express]]></category><category><![CDATA[Multer]]></category><dc:creator><![CDATA[Gabriel Rabelo]]></dc:creator><pubDate>Mon, 12 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7abf157b1bfeb7c65d7e338a620ac875/58556/node-multer-upload.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to upload files in a NodeJS application using Multer, Multer is a middleware for handling multipart/form-data that is used to send files in forms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/upload-files-with-node-and-multer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/gabrielrab.png?size=100v=40</authorImage></item><item><title><![CDATA[Class Activation Mapping in Deep Learning]]></title><description><![CDATA[Learn about the importance of the explainability of deep learning models and Class Activation Map Technique]]></description><link>https://www.loginradius.com/blog/engineering/class-activation-mapping/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/class-activation-mapping/</guid><category><![CDATA[Explainable AI]]></category><category><![CDATA[Deep Learning]]></category><category><![CDATA[CNN]]></category><category><![CDATA[Machine Learning]]></category><dc:creator><![CDATA[Ankit Choraria]]></dc:creator><pubDate>Sat, 10 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f00bfab91c9b545daddfe5a17abc22c8/58556/Cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the importance of the explainability of deep learning models and Class Activation Map Technique &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/class-activation-mapping/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/Ankit810.png?size=100v=40</authorImage></item><item><title><![CDATA[ Full data science pipeline implementation]]></title><description><![CDATA[Learn how to implement the full data science pipeline right from collecting the data to implementing ML algorithms.]]></description><link>https://www.loginradius.com/blog/engineering/full-data-science-pipeline-implementation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/full-data-science-pipeline-implementation/</guid><category><![CDATA[DataScience]]></category><category><![CDATA[Python]]></category><category><![CDATA[Web scraping]]></category><category><![CDATA[NLP]]></category><category><![CDATA[Machine learning]]></category><dc:creator><![CDATA[Rinki Nag]]></dc:creator><pubDate>Fri, 09 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5a2492e69b5cbb1c2f5bb0a3d4ca9fc2/58556/ds.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to implement the full data science pipeline right from collecting the data to implementing ML algorithms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/full-data-science-pipeline-implementation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/eaglewarrior.png?size=100v=40</authorImage></item><item><title><![CDATA[HTML Email Concept]]></title><description><![CDATA[If you choose to code your HTML email by hand, there are many different things you need to use while creating HTML email.]]></description><link>https://www.loginradius.com/blog/engineering/html-email-concept/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/html-email-concept/</guid><category><![CDATA[Html]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Nivedita Singh]]></dc:creator><pubDate>Fri, 09 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/67ac86643dbb14dedfd4fe52ff7e659c/58556/email_picture.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you choose to code your HTML email by hand, there are many different things you need to use while creating HTML email. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/html-email-concept/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/Nivedita967.png?size=100v=40</authorImage></item><item><title><![CDATA[Best IDaaS Provider - Why Loginradius is Considered as the Best IDaaS Solution]]></title><description><![CDATA[Identity-as-a-service or IDaaS refers to cloud-based applications for identity and access management provided on the basis of subscription. At its heart, IDaaS provides consumers’ systems with access, intelligence, and identity governance capabilities.]]></description><link>https://www.loginradius.com/blog/identity/best-idaas-provider-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-idaas-provider-loginradius/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[idaas provider]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 09 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a31bf6eae56026bb3a863103a340af56/7f8e9/idaas-provider.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity-as-a-service or IDaaS refers to cloud-based applications for identity and access management provided on the basis of subscription. At its heart, IDaaS provides consumers’ systems with access, intelligence, and identity governance capabilities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-idaas-provider-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Blockchain: The new technology of trust]]></title><description><![CDATA[Learn about Blockchain technology and how it works.]]></description><link>https://www.loginradius.com/blog/engineering/blockchain-the-new-technology-of-security-trust/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/blockchain-the-new-technology-of-security-trust/</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Cyber Security]]></category><dc:creator><![CDATA[Shraddha V Prasad]]></dc:creator><pubDate>Thu, 08 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/01f18fbf0dec445fa25aa3b13483883e/58556/CoverPage.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about Blockchain technology and how it works. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/blockchain-the-new-technology-of-security-trust/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/shraddhavp.png?size=100v=40</authorImage></item><item><title><![CDATA[Vim: What is it and Why to use it?]]></title><description><![CDATA[Vim is Vi's newest and most common reincarnation that is supported on every known platform, check out the article to learn about what is ViM, and why to use it.]]></description><link>https://www.loginradius.com/blog/engineering/vim-getting-started/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/vim-getting-started/</guid><category><![CDATA[Vim]]></category><category><![CDATA[Text Editor]]></category><dc:creator><![CDATA[Shubhankar Khare]]></dc:creator><pubDate>Thu, 08 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/aa9e337b13aca7c3043c49bba3b61a23/58556/Vim.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Vim is Vi&apos;s newest and most common reincarnation that is supported on every known platform, check out the article to learn about what is ViM, and why to use it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/vim-getting-started/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/iamshubhankarkhare.png?size=100v=40</authorImage></item><item><title><![CDATA[Virtual Dispersive Networking]]></title><description><![CDATA[Learn About VDN for CyberSecurity]]></description><link>https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/</guid><category><![CDATA[VDN]]></category><category><![CDATA[Cyber Security]]></category><dc:creator><![CDATA[Binay Agarwal]]></dc:creator><pubDate>Wed, 07 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d2e724f66a1588268845362a0ddec71b/58556/MIM.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn About VDN for CyberSecurity &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/agarwalBinay18.png?size=100v=40</authorImage></item><item><title><![CDATA[React Context API: What is it and How it works?]]></title><description><![CDATA[Context API is a (kind of) new feature added in version 16.3 of React that allows one to share state across the entire app (or part of it) lightly and with ease. Let's see how to use it.]]></description><link>https://www.loginradius.com/blog/engineering/react-context-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-context-api/</guid><category><![CDATA[React]]></category><category><![CDATA[Redux]]></category><category><![CDATA[Hooks]]></category><dc:creator><![CDATA[Eylon Ronen]]></dc:creator><pubDate>Wed, 07 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6fc42d03576ecaa3bcc58404bdc7afc5/58556/react.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Context API is a (kind of) new feature added in version 16.3 of React that allows one to share state across the entire app (or part of it) lightly and with ease. Let&apos;s see how to use it. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-context-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/eylonronen.png?size=100v=40</authorImage></item><item><title><![CDATA[Breaking down the 'this' keyword in Javascript]]></title><description><![CDATA[As one of the most popular programming languages currently being used all around the world, understanding the core of Javascript is essential. The 'this' keyword is one of the most difficult concepts to grasp. This blog post aims to break down the 'this' keyword into small and understandable bits.]]></description><link>https://www.loginradius.com/blog/engineering/breaking-down-this-keyword-in-javascript/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/breaking-down-this-keyword-in-javascript/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[JSConcepts]]></category><dc:creator><![CDATA[Efereyan Karen]]></dc:creator><pubDate>Tue, 06 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/05cffb8f923dacd05e1e932759a0028e/58556/this-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As one of the most popular programming languages currently being used all around the world, understanding the core of Javascript is essential. The &apos;this&apos; keyword is one of the most difficult concepts to grasp. This blog post aims to break down the &apos;this&apos; keyword into small and understandable bits. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/breaking-down-this-keyword-in-javascript/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/KarenEfereyan.png?size=100v=40</authorImage></item><item><title><![CDATA[Handling the Cheapest Fuel- Data]]></title><description><![CDATA[You can have data without information, but you cannot have information without data. Huge data is generated per day. What are the issues in handling it? How big companies manage and analyze it?]]></description><link>https://www.loginradius.com/blog/engineering/handling-cheapest-fuel-data/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/handling-cheapest-fuel-data/</guid><category><![CDATA[Data]]></category><category><![CDATA[BigData]]></category><category><![CDATA[Hadoop]]></category><dc:creator><![CDATA[Samriddhi Mishra]]></dc:creator><pubDate>Tue, 06 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4b6b53f9b05bcb043c5b8593abc26197/58556/a.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; You can have data without information, but you cannot have information without data. Huge data is generated per day. What are the issues in handling it? How big companies manage and analyze it? &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/handling-cheapest-fuel-data/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/SamriddhiMishra.png?size=100v=40</authorImage></item><item><title><![CDATA[Social Engineering Attacks: Prevention and Best Practices [Infographic]]]></title><description><![CDATA[Over the years, social engineering attacks have been a regular phenomenon against companies. It has actually become more and more sophisticated. It is high time for businesses to perform careful research and use the right instruments to remain ahead of fraudsters.]]></description><link>https://www.loginradius.com/blog/identity/social-engineering-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/social-engineering-attacks/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[mfa]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 06 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d6c93bfbe4ec11ee28e6ec187d72b68b/7f8e9/social-engineering-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Over the years, social engineering attacks have been a regular phenomenon against companies. It has actually become more and more sophisticated. It is high time for businesses to perform careful research and use the right instruments to remain ahead of fraudsters. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/social-engineering-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[GitHub CLI Tool ⚒]]></title><description><![CDATA[Learn about GitHub CLI tool and how/when to use it]]></description><link>https://www.loginradius.com/blog/engineering/github-cli-tool/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/github-cli-tool/</guid><category><![CDATA[Cloud]]></category><category><![CDATA[GIT]]></category><category><![CDATA[Version control]]></category><dc:creator><![CDATA[Saravanan Vijayamuthu]]></dc:creator><pubDate>Mon, 05 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/67f9c8247a3c5142d5ef1f220d1e512a/89989/GitHub%20CLI%20Tool.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about GitHub CLI tool and how/when to use it &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/github-cli-tool/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/SaravananVijayamuthu.png?size=100v=40</authorImage></item><item><title><![CDATA[Lazy loading in React]]></title><description><![CDATA[Learn about lazy loading in React and how/when to use it]]></description><link>https://www.loginradius.com/blog/engineering/lazy-loading-in-react/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/lazy-loading-in-react/</guid><category><![CDATA[React]]></category><category><![CDATA[Lazy loading]]></category><category><![CDATA[React Suspense]]></category><dc:creator><![CDATA[Akshay Avinash]]></dc:creator><pubDate>Mon, 05 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9413be85c5c5c59674b56bdb292753b4/58556/react.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about lazy loading in React and how/when to use it &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/lazy-loading-in-react/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/akshay11298.png?size=100v=40</authorImage></item><item><title><![CDATA[What is GraphQL? - A Basic Guide]]></title><description><![CDATA[GraphQL is a syntax that specifies how data can be requested and is usually used to load data to a client from a server. Find out why to use it and any other advantages.]]></description><link>https://www.loginradius.com/blog/engineering/what-is-graphql/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-graphql/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[API]]></category><category><![CDATA[GraphQL]]></category><category><![CDATA[Performance]]></category><dc:creator><![CDATA[Anup Aglawe]]></dc:creator><pubDate>Thu, 01 Oct 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4674ea0950b63a1ff2d08638af559bc0/58556/graph.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; GraphQL is a syntax that specifies how data can be requested and is usually used to load data to a client from a server. Find out why to use it and any other advantages. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-graphql/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/anup-a.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement – LoginRadius Announces the Availability of User Management]]></title><description><![CDATA[Businesses will enjoy simplified access control and flexible rights for their customers with the newly added User Management functionality of LoginRadius.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-announces-user-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-announces-user-management/</guid><category><![CDATA[user management]]></category><category><![CDATA[identity management]]></category><category><![CDATA[password management]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 30 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/22595533068957863c04b02f3ec0541a/7f8e9/image1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Businesses will enjoy simplified access control and flexible rights for their customers with the newly added User Management functionality of LoginRadius. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-announces-user-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Exceptions and Exception Handling in C#]]></title><link>https://www.loginradius.com/blog/engineering/exception-handling-in-csharp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/exception-handling-in-csharp/</guid><category><![CDATA[C#]]></category><category><![CDATA[Exception]]></category><category><![CDATA[Exception Handling]]></category><category><![CDATA[.NET]]></category><category><![CDATA[Exception Handling Best Practices]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Tue, 29 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/08a77b05a9e3c87430c53bdc17497fe6/58556/csharplogo.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; C# and the .NET CLR use exceptions to show that an error condition has arisen during program execution. C# programs are under constant threat of running into some sort of problem. As a program’s complexity grows, the probability that something odd would happen during its… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/exception-handling-in-csharp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[Unit Testing: What is it and why do you need it?]]></title><description><![CDATA[Unit testing is one of the types of software testing that requires an initial phase of testing. Find out the benefits and why its important for developers.]]></description><link>https://www.loginradius.com/blog/engineering/unit-testing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/unit-testing/</guid><category><![CDATA[Unit Testing]]></category><category><![CDATA[QA]]></category><category><![CDATA[Testing]]></category><dc:creator><![CDATA[Sudhanshu Pandey]]></dc:creator><pubDate>Tue, 29 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6327467722c4e2f8951e626f58fbf29f/58556/unit-testing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Unit testing is one of the types of software testing that requires an initial phase of testing. Find out the benefits and why its important for developers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/unit-testing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Sudhanshu Pandey&amp;size=100</authorImage></item><item><title><![CDATA[Consumer Identity Management for the CMO, CISO, and CIO]]></title><description><![CDATA[A modern-day consumer identity management (CIAM) platform securely collects and manages consumer identity and profile data, along with securing access to apps, computers, and other resources in the network.]]></description><link>https://www.loginradius.com/blog/identity/consumer-identity-management-cmo-ciso-cio/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/consumer-identity-management-cmo-ciso-cio/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 28 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/05db606a4d428444da8c6841bfeb49ce/7f8e9/image1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A modern-day consumer identity management (CIAM) platform securely collects and manages consumer identity and profile data, along with securing access to apps, computers, and other resources in the network. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/consumer-identity-management-cmo-ciso-cio/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Golang Maps - A Beginner’s Guide]]></title><description><![CDATA[A map is a builtin sort used for storing key-value pairs. Find out more in this article on how Golang maps work and why to use them.]]></description><link>https://www.loginradius.com/blog/engineering/golang-maps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/golang-maps/</guid><category><![CDATA[Go]]></category><category><![CDATA[dictionaries]]></category><category><![CDATA[maps]]></category><dc:creator><![CDATA[Chris Yee]]></dc:creator><pubDate>Fri, 25 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6caba3d40f8e06af28c2d45a8fbd6ea7/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A map is a builtin sort used for storing key-value pairs. Find out more in this article on how Golang maps work and why to use them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/golang-maps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Yee&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Open Source For Hacktoberfest 2020]]></title><description><![CDATA[Checkout LoginRadius Open Source Repositories where you can contribute for hackotberfest 2020]]></description><link>https://www.loginradius.com/blog/engineering/loginradius-opensource-repos-for-hacktoberfest-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/loginradius-opensource-repos-for-hacktoberfest-2020/</guid><category><![CDATA[hacktoberfest]]></category><category><![CDATA[open-source]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Hridayesh Sharma]]></dc:creator><pubDate>Fri, 25 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9a2056972f92077b2af8b32ecc2fcbdd/58556/hacktober-fest-banner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Checkout LoginRadius Open Source Repositories where you can contribute for hackotberfest 2020 &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/loginradius-opensource-repos-for-hacktoberfest-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/vyasriday.png?size=100v=40</authorImage></item><item><title><![CDATA[JWT Signing Algorithms]]></title><description><![CDATA[Deciding between which signing algorithm to use.]]></description><link>https://www.loginradius.com/blog/engineering/jwt-signing-algorithms/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/jwt-signing-algorithms/</guid><category><![CDATA[JWT]]></category><category><![CDATA[JSON Web Tokens]]></category><dc:creator><![CDATA[Nick Chim]]></dc:creator><pubDate>Thu, 24 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2fd4c7f86c996d936d9b217235d6257d/58556/unsplash.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Deciding between which signing algorithm to use. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/jwt-signing-algorithms/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/nickc95.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Render React with optimization]]></title><description><![CDATA[Optimized rendering in the frontend is a crucial procedure. Let's learn how to optimize React rendering process.]]></description><link>https://www.loginradius.com/blog/engineering/understanding-react-rendering/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/understanding-react-rendering/</guid><category><![CDATA[Node.js]]></category><category><![CDATA[React]]></category><dc:creator><![CDATA[Nathan Nguyen]]></dc:creator><pubDate>Wed, 23 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56b6489418f8549fe50d61df309dd152/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Optimized rendering in the frontend is a crucial procedure. Let&apos;s learn how to optimize React rendering process. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/understanding-react-rendering/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/nathannguyenn.png?size=100v=40</authorImage></item><item><title><![CDATA[Ajax and XHR using plain JS]]></title><description><![CDATA[Learn the concept of AJAX and XHR in JavaScript, the benefits of AJAX, and how easy it is to implement the AJAX into our web application.]]></description><link>https://www.loginradius.com/blog/engineering/ajax-and-xhr-using-plain-javascript/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/ajax-and-xhr-using-plain-javascript/</guid><category><![CDATA[XHR]]></category><category><![CDATA[JavaScript]]></category><category><![CDATA[AJAX]]></category><dc:creator><![CDATA[Apeksha Gupta]]></dc:creator><pubDate>Tue, 22 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c19cc11ae05c7a1224ef47b974bbf68f/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn the concept of AJAX and XHR in JavaScript, the benefits of AJAX, and how easy it is to implement the AJAX into our web application. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/ajax-and-xhr-using-plain-javascript/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/ApekshaAgarwal.png?size=100v=40</authorImage></item><item><title><![CDATA[Using MongoDB as Datasource in GoLang]]></title><description><![CDATA[Learn how to use MongoDB as a data source for your Go application using the mongo-go driver]]></description><link>https://www.loginradius.com/blog/engineering/mongodb-as-datasource-in-golang/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/mongodb-as-datasource-in-golang/</guid><category><![CDATA[Go]]></category><category><![CDATA[MongoDB]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Mon, 21 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c46c9414b00b97863489d5b361d13210/58556/gomongo.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to use MongoDB as a data source for your Go application using the mongo-go driver &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/mongodb-as-datasource-in-golang/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Understanding event loop in JavaScript]]></title><description><![CDATA[Learn the basic concepts about the JavaScript Event Loop.]]></description><link>https://www.loginradius.com/blog/engineering/understanding-event-loop/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/understanding-event-loop/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[event-loop]]></category><category><![CDATA[call stack]]></category><category><![CDATA[event queue]]></category><category><![CDATA[multi-threaded]]></category><dc:creator><![CDATA[Aman Agrawal]]></dc:creator><pubDate>Sat, 19 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a6f240c6e67891e816aa9b6541eeb62b/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn the basic concepts about the JavaScript Event Loop. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/understanding-event-loop/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/aman-agrwl.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Supports Hacktoberfest 2020]]></title><description><![CDATA[Open Source is changing the world, One Pull Request at a time. Join LoginRadius this year in supporting hacktoerbest 2020 by contributing to open source and get cool swags from LoginRadius]]></description><link>https://www.loginradius.com/blog/engineering/loginradius-supports-hacktoberfest-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/loginradius-supports-hacktoberfest-2020/</guid><category><![CDATA[hacktoberfest]]></category><category><![CDATA[open-source]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Hridayesh Sharma]]></dc:creator><pubDate>Fri, 18 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9a2056972f92077b2af8b32ecc2fcbdd/58556/hacktober-fest-banner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Open Source is changing the world, One Pull Request at a time. Join LoginRadius this year in supporting hacktoerbest 2020 by contributing to open source and get cool swags from LoginRadius &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/loginradius-supports-hacktoberfest-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/vyasriday.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Delivers Exceptional Authentication With The Launch Of Identity Experience Framework]]></title><description><![CDATA[Overall, companies need to keep their customers loyal to their goods, services , and brands — which is why the need for the hour is an effective user interface. It can have customer interactions that are most conducive to any company's success.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-identity-experience-framework/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-identity-experience-framework/</guid><category><![CDATA[authentication]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Fri, 18 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/93283d4127ab6cd9e3f3d5c33cd47707/c0524/IDx.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Overall, companies need to keep their customers loyal to their goods, services , and brands — which is why the need for the hour is an effective user interface. It can have customer interactions that are most conducive to any company&apos;s success. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-identity-experience-framework/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[How to implement Facebook Login]]></title><description><![CDATA[This article will explain about social login benefits and how we can implement Sign In using Facebook on our website or mobile app.]]></description><link>https://www.loginradius.com/blog/engineering/login-with-facebook/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/login-with-facebook/</guid><category><![CDATA[Login With Facebook]]></category><category><![CDATA[Facebook]]></category><category><![CDATA[Facebook Login]]></category><category><![CDATA[Login]]></category><category><![CDATA[Oauth]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Wed, 16 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d16e503b9517b5df8496efd994380504/25338/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This article will explain about social login benefits and how we can implement Sign In using Facebook on our website or mobile app. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/login-with-facebook/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Production Grade Development using Docker-Compose]]></title><link>https://www.loginradius.com/blog/engineering/production-grade-development-using-docker-compose/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/production-grade-development-using-docker-compose/</guid><category><![CDATA[Docker]]></category><category><![CDATA[Docker-compose]]></category><dc:creator><![CDATA[Anurag Choudhary]]></dc:creator><pubDate>Fri, 11 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e913b33dfd194b83cdd0b013f0871d4d/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Assuming that the reader of this blog has a fair idea of the docker ecosystem! Docker has changed the world of software development! Since the last few years, docker has helped the developer community, enterprises, and startups to create solutions quickly and effectively. Also… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/production-grade-development-using-docker-compose/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/choudharyanurag.png?size=100v=40</authorImage></item><item><title><![CDATA[Best SSO Provider: Why LoginRadius Is Considered As The Best SSO Solution]]></title><description><![CDATA[A unique authentication mechanism that allows users to access several programmes with a single set of credentials, such as a username and password, is Single Sign-on (or SSO).]]></description><link>https://www.loginradius.com/blog/identity/best-sso-providers-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-sso-providers-loginradius/</guid><category><![CDATA[sso provider]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 11 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f6a38b45d657a836aef0b20ef3022403/58556/best-sso-provider.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A unique authentication mechanism that allows users to access several programmes with a single set of credentials, such as a username and password, is Single Sign-on (or SSO). &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-sso-providers-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Web Workers: How to add multi-threading in JS]]></title><description><![CDATA[ Learn how web workers help with the success of the web app and get started by creating a simple web worker for JavaScript.]]></description><link>https://www.loginradius.com/blog/engineering/adding-multi-threading-to-javascript-using-web-workers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/adding-multi-threading-to-javascript-using-web-workers/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[Web]]></category><dc:creator><![CDATA[Hridayesh Sharma]]></dc:creator><pubDate>Wed, 09 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2e0bb83a49cc5eb5b04a62c51cf495bb/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt;  Learn how web workers help with the success of the web app and get started by creating a simple web worker for JavaScript. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/adding-multi-threading-to-javascript-using-web-workers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/vyasriday.png?size=100v=40</authorImage></item><item><title><![CDATA[Angular State Management With NGXS]]></title><description><![CDATA[NGXS is a state management pattern + library for Angular. It acts as a single source of truth for your application's state, providing simple rules for predictable state mutations.]]></description><link>https://www.loginradius.com/blog/engineering/angular-state-management-with-ngxs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/angular-state-management-with-ngxs/</guid><category><![CDATA[Angular]]></category><category><![CDATA[NGXS]]></category><category><![CDATA[Redux]]></category><dc:creator><![CDATA[Akshaya Sharma]]></dc:creator><pubDate>Tue, 08 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a6cc04de422582309bcb1c936a4244d6/58556/title-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; NGXS is a state management pattern + library for Angular. It acts as a single source of truth for your application&apos;s state, providing simple rules for predictable state mutations. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/angular-state-management-with-ngxs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/akshay-js.png?size=100v=40</authorImage></item><item><title><![CDATA[What's new in the go 1.15]]></title><link>https://www.loginradius.com/blog/engineering/what-is-the-new-go-1-15/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-the-new-go-1-15/</guid><category><![CDATA[Go]]></category><category><![CDATA[Golang]]></category><category><![CDATA[Go 1.15]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Mon, 07 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a12ace4cf8f8db7e673481e22dc14c33/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Go announced Go 1.15 version on 11 Aug 2020. Highlighted updates and features include Substantial improvements to the Go linker, Improved allocation for small objects at high core counts, X.509 CommonName deprecation, GOPROXY supports skipping proxies that return errors, New… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-the-new-go-1-15/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Let’s Take A MEME Break!!!]]></title><link>https://www.loginradius.com/blog/engineering/lets-take-meme-break/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/lets-take-meme-break/</guid><category><![CDATA[MEME]]></category><category><![CDATA[Programming]]></category><category><![CDATA[Humor]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Fri, 04 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/70f72136eb4f9f794700c1b2afd974c8/25338/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Programming is an excellent exercise for your brain as programmers deal with never-ending situations like bugs, compiler, issues, deadlines, languages, etc. During all these times, other than the phenomenal codes, we produce MEMEs and a hell lot of MEMEs MEMEs can light the… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/lets-take-meme-break/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[PKCE: What it is and how to use it with OAuth 2.0]]></title><description><![CDATA[If you are working with OAuth and OIDC authorization code flow and want to setup PKCE flow then this article will help you to understand everything about PKCE.]]></description><link>https://www.loginradius.com/blog/engineering/pkce/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/pkce/</guid><category><![CDATA[PKCE]]></category><category><![CDATA[Oauth]]></category><category><![CDATA[OIDC]]></category><dc:creator><![CDATA[Narendra Pareek]]></dc:creator><pubDate>Thu, 03 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7522430985a36d7f8c6267ed773d5447/ad85c/pkce.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you are working with OAuth and OIDC authorization code flow and want to setup PKCE flow then this article will help you to understand everything about PKCE. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/pkce/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/pareek-narendra.png?size=100v=40</authorImage></item><item><title><![CDATA[Single-Page Applications: Building A Secure Login Pathway with LoginRadius]]></title><description><![CDATA[Single-page apps, or SPAs, are web applications that load and update a single HTML page by dynamically rendering details from the browser as (and when) a user interacts with the programme.]]></description><link>https://www.loginradius.com/blog/identity/single-page-applications/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/single-page-applications/</guid><category><![CDATA[cx]]></category><category><![CDATA[authentication]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 03 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5fe8062d0b85ed5d995e46ba2b926ab3/7f8e9/single-page-applications.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Single-page apps, or SPAs, are web applications that load and update a single HTML page by dynamically rendering details from the browser as (and when) a user interacts with the programme. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/single-page-applications/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Big Data - Testing Strategy]]></title><description><![CDATA[With the exponential growth in the number of big data applications in the world, Testing in big data applications is related to database, infrastructure and performance testing and functional testing. This blog guides what should be the strategy for testing Big Data applications.]]></description><link>https://www.loginradius.com/blog/engineering/big-data-testing-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/big-data-testing-strategy/</guid><category><![CDATA[Testing]]></category><category><![CDATA[Big Data]]></category><category><![CDATA[Big Data Testing]]></category><dc:creator><![CDATA[Sudhey Sharma]]></dc:creator><pubDate>Wed, 02 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2997b1b5bea2cc94a828fae181ebf972/58556/big-data.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the exponential growth in the number of big data applications in the world, Testing in big data applications is related to database, infrastructure and performance testing and functional testing. This blog guides what should be the strategy for testing Big Data applications. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/big-data-testing-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/sudheysharma.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Releases Consumer Digital Identity Trend Report 2020]]></title><description><![CDATA[LoginRadius, a pioneer in cloud-based customer identity and access management (CIAM) solution, has released an industry report titled 'Consumer Identity Trend 2020' for C-suite professionals and B2C business product managers concerned with customer identity.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-trend-report-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-trend-report-2020/</guid><category><![CDATA[industry news]]></category><category><![CDATA[consumer identity]]></category><category><![CDATA[digital identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 02 Sep 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/84c788d0b2cf4a33820f04a33a604859/c0524/consumer-identity-report-loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius, a pioneer in cloud-based customer identity and access management (CIAM) solution, has released an industry report titled &apos;Consumer Identity Trend 2020&apos; for C-suite professionals and B2C business product managers concerned with customer identity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-consumer-digital-identity-trend-report-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Email Verification API (EVA)]]></title><description><![CDATA[Email authentication, being the traditional way of authentication and used most widely. Increase in the spams has also increased the disposable email registrations. To reduce and identify such unwanted users, EVA(Email Verification API) is the tool, developed by LoginRadius developers.]]></description><link>https://www.loginradius.com/blog/engineering/email-verification-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/email-verification-api/</guid><category><![CDATA[Free tool]]></category><category><![CDATA[Developer Resources ]]></category><category><![CDATA[Verification]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Aman Agrawal]]></dc:creator><pubDate>Mon, 31 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9674b13085ba4d36812d596ecc764c38/58556/eva.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Email authentication, being the traditional way of authentication and used most widely. Increase in the spams has also increased the disposable email registrations. To reduce and identify such unwanted users, EVA(Email Verification API) is the tool, developed by LoginRadius developers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/email-verification-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/aman-agrwl.png?size=100v=40</authorImage></item><item><title><![CDATA[Implement AntiXssMiddleware in .NET Core Web]]></title><link>https://www.loginradius.com/blog/engineering/anti-xss-middleware-asp-core/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/anti-xss-middleware-asp-core/</guid><category><![CDATA[C#]]></category><category><![CDATA[ASP.NET]]></category><dc:creator><![CDATA[Hemant Manwani]]></dc:creator><pubDate>Wed, 26 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f9d627c09d3f605797e2dff0f5974a61/58556/antixss.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we learn how to implement the AntiXssMiddleware in .NET Core. First, we will understand about the cross-site scripting. Cross-Site Scripting(XSS) Cross-site scripting is a security vulnerability and a client-side code injection attack. In this attack, the malicious… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/anti-xss-middleware-asp-core/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>15</timeToReadBlog><authorImage>https://github.com/hemant404.png?size=100v=40</authorImage></item><item><title><![CDATA[Setting Up and Running Apache Kafka on Windows OS]]></title><link>https://www.loginradius.com/blog/engineering/quick-kafka-installation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/quick-kafka-installation/</guid><category><![CDATA[Kafka]]></category><category><![CDATA[Windows]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Tue, 25 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/41484554ead7eb70ade1abe9498282b0/58556/messagelog.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this post, we will look at the step-by-step process for Kafka Installation on Windows. Kafka is an open-source stream-processing software platform and comes under the Apache software foundation. What is Kafka? Kafka is used for real-time streams of data, to collect big data… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/quick-kafka-installation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[Getting Started with OAuth 2.0]]></title><description><![CDATA[Using this blog one can easily understand the basic concept of Oauth 2.0]]></description><link>https://www.loginradius.com/blog/engineering/oauth2/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/oauth2/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Oauth]]></category><category><![CDATA[Authentication]]></category><dc:creator><![CDATA[Indrasen Kumar]]></dc:creator><pubDate>Mon, 24 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2b98b97b1a199e3e7378bcf740073407/58556/oauth2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Using this blog one can easily understand the basic concept of Oauth 2.0 &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/oauth2/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/indrasen715.png?size=100v=40</authorImage></item><item><title><![CDATA[Best Practice Guide For Rest API Security | LoginRadius]]></title><link>https://www.loginradius.com/blog/engineering/best-practice-guide-for-rest-api-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/best-practice-guide-for-rest-api-security/</guid><category><![CDATA[RestAPI]]></category><category><![CDATA[Rest API]]></category><category><![CDATA[Rest API Security]]></category><category><![CDATA[Best Practice]]></category><category><![CDATA[Rest API Developer Guide]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Thu, 20 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0072087246a78a28a06a6c6744a6823a/58556/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is the Rest API? RESTful programming provides stateless and a uniform interface, Rest API is HTTP-based URLs that hide the back-end infrastructure from the user. Rest APIs provide the back end for modern web and mobile applications.  Why is API security important? Rest APIs… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/best-practice-guide-for-rest-api-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Let's Write a JavaScript Library in ES6 using Webpack and Babel]]></title><description><![CDATA[Writing your own webpack configuration for a JavaScript library in ES6 and learn webpack along the way.]]></description><link>https://www.loginradius.com/blog/engineering/write-a-javascript-library-using-webpack-and-babel/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/write-a-javascript-library-using-webpack-and-babel/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[Webpack]]></category><category><![CDATA[NodeJs]]></category><dc:creator><![CDATA[Hridayesh Sharma]]></dc:creator><pubDate>Tue, 18 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b9b74a766ec8c0c06733b438fefae5ae/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Writing your own webpack configuration for a JavaScript library in ES6 and learn webpack along the way. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/write-a-javascript-library-using-webpack-and-babel/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/vyasriday.png?size=100v=40</authorImage></item><item><title><![CDATA[Cross Domain Security]]></title><description><![CDATA[Cross domain security address security threat by enabling the information sharing in more reliable and secure environments. Cross domain security is an inclusive approach to defending against all kind of threats to data connections at the boundaries of sensitive or classified networks.]]></description><link>https://www.loginradius.com/blog/engineering/cross-domain-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/cross-domain-security/</guid><category><![CDATA[Security]]></category><category><![CDATA[Web Security]]></category><category><![CDATA[Cross-Domain]]></category><dc:creator><![CDATA[Abhimanyu Singh Rathore]]></dc:creator><pubDate>Sun, 16 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f2c34b70cad9028b5628b052956b4561/58556/cross_domain_security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cross domain security address security threat by enabling the information sharing in more reliable and secure environments. Cross domain security is an inclusive approach to defending against all kind of threats to data connections at the boundaries of sensitive or classified networks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/cross-domain-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/abhir9.png?size=100v=40</authorImage></item><item><title><![CDATA[Best Free UI/UX Design Tools/Resources 2020]]></title><description><![CDATA[As a designer, often wondered which new tools and utilities, other designers are using? So here is a list of all the tools and utilities famous around the world in designers.]]></description><link>https://www.loginradius.com/blog/engineering/best-ui-ux-design-tools-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/best-ui-ux-design-tools-2020/</guid><category><![CDATA[Design]]></category><category><![CDATA[UX]]></category><category><![CDATA[Tools]]></category><dc:creator><![CDATA[Hitesh Kumawat]]></dc:creator><pubDate>Thu, 13 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/056d16dfcc7fa66e5b31f51aa531383a/ad85c/ux-ui.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a designer, often wondered which new tools and utilities, other designers are using? So here is a list of all the tools and utilities famous around the world in designers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/best-ui-ux-design-tools-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hitesh Kumawat&amp;size=100</authorImage></item><item><title><![CDATA[A journey from Node to GoLang]]></title><description><![CDATA[If your existing technology is not fulfilling all your needs and you are thinking about switching to the new one. Also, if you are concerned about the performance. Here is the blog that can help you in this direction.]]></description><link>https://www.loginradius.com/blog/engineering/a-journey-from-node-to-golang/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/a-journey-from-node-to-golang/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[Golang]]></category><category><![CDATA[Performance]]></category><dc:creator><![CDATA[Narendra Pareek]]></dc:creator><pubDate>Tue, 11 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7495b241d8dd853cf8580344cc9332f2/ad85c/node-go.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If your existing technology is not fulfilling all your needs and you are thinking about switching to the new one. Also, if you are concerned about the performance. Here is the blog that can help you in this direction. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/a-journey-from-node-to-golang/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/pareek-narendra.png?size=100v=40</authorImage></item><item><title><![CDATA[React Hooks: A Beginners Guide]]></title><description><![CDATA[A walkthrough guide on React Hooks, what is React Hooks, benefits of Hooks, and how to use Hooks in React and more.]]></description><link>https://www.loginradius.com/blog/engineering/react-hooks-guide/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-hooks-guide/</guid><category><![CDATA[React]]></category><category><![CDATA[Hooks]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Fri, 07 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/48f1a9f24091fba7929dcb79ec13b4fe/58556/react-hooks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A walkthrough guide on React Hooks, what is React Hooks, benefits of Hooks, and how to use Hooks in React and more. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-hooks-guide/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[Securing Enterprise Mobile Apps with LoginRadius]]></title><description><![CDATA[We are already living in the future as corporate mobile applications are the future of companies. More and more businesses are combining their organisational processes with mobile networks with the the popularity of innovations such as 5 G, blockchain, AI , and machine language.]]></description><link>https://www.loginradius.com/blog/identity/securing-enterprise-mobile-apps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/securing-enterprise-mobile-apps/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 07 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/899394e76907ff847d314a89b6ded679/7f8e9/Secure-Enterprise-Mobile-App.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We are already living in the future as corporate mobile applications are the future of companies. More and more businesses are combining their organisational processes with mobile networks with the the popularity of innovations such as 5 G, blockchain, AI , and machine language. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/securing-enterprise-mobile-apps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[DESIGN THINKING -A visual approach to understand  user’s needs]]></title><description><![CDATA[Design thinking is a solution-oriented, iterative process where the team creates the design while keeping the end customers in mind. This blog guides you about how does design-led thinking works.]]></description><link>https://www.loginradius.com/blog/engineering/design-led-thinking/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/design-led-thinking/</guid><category><![CDATA[Design]]></category><category><![CDATA[Design Thinking]]></category><category><![CDATA[UX]]></category><dc:creator><![CDATA[Deepali Soni]]></dc:creator><pubDate>Thu, 06 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/110edfa95f48f0a46a297c46621f3040/58556/design_led_thinking.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Design thinking is a solution-oriented, iterative process where the team creates the design while keeping the end customers in mind. This blog guides you about how does design-led thinking works. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/design-led-thinking/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Deepali Soni&amp;size=100</authorImage></item><item><title><![CDATA[Deep Dive into Container Security Scanning]]></title><description><![CDATA[At the heart of any image scanning tool is static analysis against a “Common Vulnerabilities and Exposures” (CVE) database. Each layer within the container image is analyzed and queried to discover known vulnerabilities.]]></description><link>https://www.loginradius.com/blog/engineering/container-security-scanning/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/container-security-scanning/</guid><category><![CDATA[Docker]]></category><category><![CDATA[Container]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Rashmi Jain]]></dc:creator><pubDate>Tue, 04 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3420a61c66e126bfa00855959eeb5a57/58556/cover_container_security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; At the heart of any image scanning tool is static analysis against a “Common Vulnerabilities and Exposures” (CVE) database. Each layer within the container image is analyzed and queried to discover known vulnerabilities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/container-security-scanning/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Rashmi Jain&amp;size=100</authorImage></item><item><title><![CDATA[Different ways to send an email with Golang]]></title><description><![CDATA[In this blog, we’ll look at different methods to send an email with Go, First we will explore inbuilt smtp package, then we will move to use a popular package Gomail and finally we will send HTML emails using custom templates.]]></description><link>https://www.loginradius.com/blog/engineering/sending-emails-with-golang/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/sending-emails-with-golang/</guid><category><![CDATA[Go]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Mon, 03 Aug 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8c5f2a8ca4c0d8c2e442b0b5b909e070/58556/email_cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll look at different methods to send an email with Go, First we will explore inbuilt smtp package, then we will move to use a popular package Gomail and finally we will send HTML emails using custom templates. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/sending-emails-with-golang/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Snapshot testing using Nightwatch and mocha]]></title><description><![CDATA[Snapshot testing is one of many different testing tools, which compares the previous and current snapshot. Unlike TDD, snapshot testing relies on the fact that your component renders correctly already. ]]></description><link>https://www.loginradius.com/blog/engineering/snapshot-testing-using-nightwatch-and-mocha/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/snapshot-testing-using-nightwatch-and-mocha/</guid><category><![CDATA[QA]]></category><category><![CDATA[Nightwatch]]></category><category><![CDATA[snapshot-testing]]></category><dc:creator><![CDATA[Nitesh Jain]]></dc:creator><pubDate>Wed, 29 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/858d55e4f691f5e5780be7675877f12d/58556/snapshot_nightwatch.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Snapshot testing is one of many different testing tools, which compares the previous and current snapshot. Unlike TDD, snapshot testing relies on the fact that your component renders correctly already.  &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/snapshot-testing-using-nightwatch-and-mocha/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/niteshjain1987.png?size=100v=40</authorImage></item><item><title><![CDATA[Enhancing Customer Experience in Airlines With LoginRadius]]></title><description><![CDATA[Customer experience in the airline industry is often defined as what the customer perceives and experiences while traveling through the different departure stages and arrival in an airport.]]></description><link>https://www.loginradius.com/blog/growth/improving-airline-customer-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improving-airline-customer-experience/</guid><category><![CDATA[airline industry]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 29 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/245fbd0c24aff3c3556e65e9d734d871/7f8e9/airline-cx.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customer experience in the airline industry is often defined as what the customer perceives and experiences while traveling through the different departure stages and arrival in an airport. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improving-airline-customer-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Qualities of an agile development team]]></title><description><![CDATA[Agile is becoming another SDLC methodology but in reality, it is beyond normal project management. With time It’s been accessorized a lot and leaving behind the basic building blocks and the important entity the Agile Development Teams.]]></description><link>https://www.loginradius.com/blog/engineering/agile-development-team/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/agile-development-team/</guid><category><![CDATA[Agile]]></category><category><![CDATA[Development]]></category><category><![CDATA[Teamwork]]></category><dc:creator><![CDATA[Vikram Jain]]></dc:creator><pubDate>Mon, 27 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3e69292068b3c0327db542c1bc770f1c/58556/agile.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Agile is becoming another SDLC methodology but in reality, it is beyond normal project management. With time It’s been accessorized a lot and leaving behind the basic building blocks and the important entity the Agile Development Teams. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/agile-development-team/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vikram Jain&amp;size=100</authorImage></item><item><title><![CDATA[IAM, CIAM, and IDaaS - know the difference and terms used for them]]></title><description><![CDATA[Over time, organizations are using many terminologies for IAM, CIAM, and IDaaS platforms. This article clarifies the use of these terms, key features, and common use cases of IAM, CIAM, and IDaaS platforms.]]></description><link>https://www.loginradius.com/blog/engineering/difference-between-iam-ciam-and-idaas/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/difference-between-iam-ciam-and-idaas/</guid><category><![CDATA[iam]]></category><category><![CDATA[ciam]]></category><category><![CDATA[idaas]]></category><category><![CDATA[identity]]></category><dc:creator><![CDATA[Archna Yadav]]></dc:creator><pubDate>Fri, 24 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a5130bd86b66f92b9a0458e359a10100/58556/triplets.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Over time, organizations are using many terminologies for IAM, CIAM, and IDaaS platforms. This article clarifies the use of these terms, key features, and common use cases of IAM, CIAM, and IDaaS platforms. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/difference-between-iam-ciam-and-idaas/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Archna Yadav&amp;size=100</authorImage></item><item><title><![CDATA[How to obtain iOS application logs without Mac]]></title><link>https://www.loginradius.com/blog/engineering/how-to-obtain-ios-application-logs-without-mac/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-obtain-ios-application-logs-without-mac/</guid><category><![CDATA[Logs]]></category><category><![CDATA[ios]]></category><category><![CDATA[xcode]]></category><category><![CDATA[iPhone]]></category><category><![CDATA[troubleshoot]]></category><category><![CDATA[Mac]]></category><dc:creator><![CDATA[Tanvi Jain]]></dc:creator><pubDate>Wed, 22 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4fdc8a84c6075fd3dd77f0b0be3f1939/58556/Log.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Logs are very helpful in finding the root cause of the issues you may be experiencing in an app. It is an efficient way to resolve issues by knowing the exact reason after checking Logs. Let&apos;s say we have developed an iOS app. As in many situations, we want to test our app on… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-obtain-ios-application-logs-without-mac/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/tanvijn.png?size=100v=40</authorImage></item><item><title><![CDATA[Data Governance Best Practices for Enterprises]]></title><description><![CDATA[The world has undergone a massive transformation in governing the data and is establishing methods to standardize, integrate, and protect such information. The EU's General Data Protection Regulation implemented in 2018 was a masterstroke to the data governance arrangement.]]></description><link>https://www.loginradius.com/blog/identity/data-governance-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/data-governance-best-practices/</guid><category><![CDATA[data governance]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 22 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e54d1b1d163434c7a6fcdb2b8ea2b712/c0524/Data-Governance-Best-Practices.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The world has undergone a massive transformation in governing the data and is establishing methods to standardize, integrate, and protect such information. The EU&apos;s General Data Protection Regulation implemented in 2018 was a masterstroke to the data governance arrangement. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/data-governance-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Benefits and usages of Hosts File]]></title><description><![CDATA[Hosts file maps hostnames to IP addresses, sometimes required to be edited either to block some sites or to test some custom domain.This blog explains how can we edit the hosts in different operating systems.]]></description><link>https://www.loginradius.com/blog/engineering/hosts-file/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/hosts-file/</guid><category><![CDATA[Computer tricks]]></category><category><![CDATA[Networking]]></category><category><![CDATA[Hosts File]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Mon, 20 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/54b234435c9e01dc08a3d668cceb489e/991d2/index.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hosts file maps hostnames to IP addresses, sometimes required to be edited either to block some sites or to test some custom domain.This blog explains how can we edit the hosts in different operating systems. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/hosts-file/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[React state management: What is it and why to use it?]]></title><description><![CDATA[Learn about React state management and why we need state management and how to use it with React hooks and Redux in the best possible way.]]></description><link>https://www.loginradius.com/blog/engineering/react-state-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/react-state-management/</guid><category><![CDATA[React]]></category><category><![CDATA[Redux]]></category><category><![CDATA[Hooks]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Fri, 17 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ebbce990879fea50a2a8cce920c82894/a3e81/title-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about React state management and why we need state management and how to use it with React hooks and Redux in the best possible way. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/react-state-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>14</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Top 10 Benefits of Multi-Factor Authentication (MFA)]]></title><description><![CDATA[Explore the key benefits of MFA, from enhanced security to phishing protection. Learn why multi-factor authentication is essential for businesses & individuals.]]></description><link>https://www.loginradius.com/blog/identity/benefits-of-mfa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/benefits-of-mfa/</guid><category><![CDATA[benefits of mfa]]></category><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 16 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ede86c8f60fdd8687498940409dcf94b/58556/benefits-of-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Explore the key benefits of MFA, from enhanced security to phishing protection. Learn why multi-factor authentication is essential for businesses &amp; individuals. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/benefits-of-mfa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Build vs Buy: Securing Customer Identity with Loginradius]]></title><description><![CDATA[The most important assets of any company are customer identification and personal data. In most situations, businesses come across two simple options when designing a platform that collects, handles, and uses consumer data: to create or to purchase.]]></description><link>https://www.loginradius.com/blog/identity/build-vs-buy-securing-customer-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/build-vs-buy-securing-customer-identity/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[mfa]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 16 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/45b8d1537af84b74edb14b73de654064/176df/Build-vs-Buy-Securing-Customer-Identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The most important assets of any company are customer identification and personal data. In most situations, businesses come across two simple options when designing a platform that collects, handles, and uses consumer data: to create or to purchase. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/build-vs-buy-securing-customer-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[HTTP Security Headers]]></title><description><![CDATA[HTTP security headers are a fundamental part of website security. Upon implementation, they protect you against the types of attacks that your site is most likely to come across. These headers protect against XSS, code injection, clickjacking, etc. This article explains most commonly used HTTP headers in context to application security]]></description><link>https://www.loginradius.com/blog/engineering/http-security-headers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/http-security-headers/</guid><category><![CDATA[Security]]></category><category><![CDATA[HTTP Headers]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Wed, 15 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4bea535329516b2e7baca9bfc373ccfc/991d2/http-security-headers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; HTTP security headers are a fundamental part of website security. Upon implementation, they protect you against the types of attacks that your site is most likely to come across. These headers protect against XSS, code injection, clickjacking, etc. This article explains most commonly used HTTP headers in context to application security &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/http-security-headers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Identity Import Manager, An Automated Feature for Seamless Data Migration]]></title><description><![CDATA[The LoginRadius Identity Import Manager is a flexible tool that allows companies to import and manage multiple customer profile data from any different application, service, or database.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-identity-import-manager-data-migration/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-identity-import-manager-data-migration/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 15 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/26e6bacf88d514c7c1636690c220fb54/176df/LoginRadius-Identity-Import.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The LoginRadius Identity Import Manager is a flexible tool that allows companies to import and manage multiple customer profile data from any different application, service, or database. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-identity-import-manager-data-migration/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Sonarqube: What it is and why to use it?]]></title><description><![CDATA[SonarQube is a universal tool for static code analysis that has become more or less the industry standard. Keeping code clean, simple, and easy to read is also a lot easier with SonarQube.]]></description><link>https://www.loginradius.com/blog/engineering/sonarqube/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/sonarqube/</guid><category><![CDATA[Code Quality]]></category><category><![CDATA[SonarQube]]></category><dc:creator><![CDATA[Kheenvraj Lomror]]></dc:creator><pubDate>Sat, 11 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/003f532e69e3da13ba2847a99744ade0/58556/sonarqube.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SonarQube is a universal tool for static code analysis that has become more or less the industry standard. Keeping code clean, simple, and easy to read is also a lot easier with SonarQube. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/sonarqube/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/rajlomror.png?size=100v=40</authorImage></item><item><title><![CDATA[How to create and validate JSON Web Tokens in Deno]]></title><link>https://www.loginradius.com/blog/engineering/jwt-authentication-with-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/jwt-authentication-with-deno/</guid><category><![CDATA[Deno]]></category><category><![CDATA[JWT]]></category><category><![CDATA[JSON Web Token]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Fri, 10 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2ca148ad6e08643634262607131d918e/58556/deno_jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll see how to create and validate a JWT(JSON Web Token) in Deno. For this, we’ll be using djwt, the absolute minimum library to make JSON Web Tokens in deno and Oak framework Before You Get Started This tutorial assumes you have: A basic understanding of… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/jwt-authentication-with-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Cloud Cost Optimization in 2021]]></title><description><![CDATA[Optimization of cloud costs lowers spending by recognizing mismanaged capital, reserving higher discount space, and proper sizing.]]></description><link>https://www.loginradius.com/blog/engineering/cloud-cost-optimization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/cloud-cost-optimization/</guid><category><![CDATA[Cloud]]></category><category><![CDATA[Optmization]]></category><dc:creator><![CDATA[Vijay Singh Shekhawat]]></dc:creator><pubDate>Thu, 09 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9b95fca99dc1c53ce661e89fd0341f6d/58556/cloud.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Optimization of cloud costs lowers spending by recognizing mismanaged capital, reserving higher discount space, and proper sizing. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/cloud-cost-optimization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/code-vj.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Identity Management for Education Sector has Become Crucial]]></title><description><![CDATA[There is a notable increase in e-learning from the last couple of months. Many educational institutions are already facing security crises and trying their best to sustain.]]></description><link>https://www.loginradius.com/blog/identity/identity-management-for-education/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-management-for-education/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 08 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a471e5137bd738cd5336614cacab7024/176df/Identity-Management-for-Education.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; There is a notable increase in e-learning from the last couple of months. Many educational institutions are already facing security crises and trying their best to sustain. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-management-for-education/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Service Mesh with Envoy]]></title><link>https://www.loginradius.com/blog/engineering/service-mesh-with-envoy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/service-mesh-with-envoy/</guid><category><![CDATA[Service Mesh]]></category><category><![CDATA[Envoy]]></category><category><![CDATA[Microservices]]></category><dc:creator><![CDATA[Piyush Kumar]]></dc:creator><pubDate>Mon, 06 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/150ba7965ba96274595177480a3f562a/58556/front-image.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This post will cover a demo working setup of a service mesh architecture using Envoy using a demo application. In this service mesh architecture, we will be using Envoy proxy for both control and data plane. The setup is deployed in a Kubernetes cluster using Amazon EKS. Pre… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/service-mesh-with-envoy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>16</timeToReadBlog><authorImage>https://github.com/kpiyush17.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Approves Consumer Audit Trail for In-Depth Data Analysis and Risk Assessment]]></title><description><![CDATA[The recently released Consumer Audit Trail by LoginRadius tracks threats in real time, handles incident response, and even conducts a forensic analysis on past security incidents, if necessary.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-consumer-audit-trail-data-analysis/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-consumer-audit-trail-data-analysis/</guid><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 02 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5488fe7ebb8b7f11ae2ca5de839d58ad/58556/Consumer-Audit-Trail.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The recently released Consumer Audit Trail by LoginRadius tracks threats in real time, handles incident response, and even conducts a forensic analysis on past security incidents, if necessary. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-consumer-audit-trail-data-analysis/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Kafka Streams: A stream processing guide]]></title><description><![CDATA[Learn about Kafka Streams, key concepts and highlights with simple streaming or a word count application using Kafka Streams in Scala]]></description><link>https://www.loginradius.com/blog/engineering/stream-processing-using-kafka/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/stream-processing-using-kafka/</guid><category><![CDATA[Scala]]></category><category><![CDATA[Kafka]]></category><category><![CDATA[Kafka Streams]]></category><dc:creator><![CDATA[Priyadarshan Mohanty]]></dc:creator><pubDate>Wed, 01 Jul 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0b37b7b26ad97126a6657a2447528848/58556/header.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about Kafka Streams, key concepts and highlights with simple streaming or a word count application using Kafka Streams in Scala &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/stream-processing-using-kafka/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/priyadarshan1995.png?size=100v=40</authorImage></item><item><title><![CDATA[Self-Hosted MongoDB]]></title><description><![CDATA[Learn how to optimize your DB cost? This article will help you with the complete migration steps from a cloud to a self-hosted environment.]]></description><link>https://www.loginradius.com/blog/engineering/self-hosted-mongo/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/self-hosted-mongo/</guid><category><![CDATA[MongoDB]]></category><category><![CDATA[Mongo]]></category><category><![CDATA[AWS]]></category><category><![CDATA[Atlas]]></category><dc:creator><![CDATA[Chinmaya Pati]]></dc:creator><pubDate>Tue, 30 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1ded984fa0b8dec44a3794c8bf5b7b2e/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to optimize your DB cost? This article will help you with the complete migration steps from a cloud to a self-hosted environment. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/self-hosted-mongo/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/cnp96.png?size=100v=40</authorImage></item><item><title><![CDATA[Roadmap of idx-auto-tester]]></title><link>https://www.loginradius.com/blog/engineering/roadmap-idx-autotester/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/roadmap-idx-autotester/</guid><category><![CDATA[Automation]]></category><category><![CDATA[idx]]></category><category><![CDATA[roadmap]]></category><dc:creator><![CDATA[Rakesh Pareek]]></dc:creator><pubDate>Tue, 30 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/af8901a2791cbe7b9510d719854dd766/58556/roadmap_idx_auto_tester.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Roadmap of IDX-auto-tester We&apos;re delightfully Announcing the upcoming releases of LoginRadius Identity-Experience-Framework Open-Source Automation These full-version releases will include more test coverage and major changes with several improvements &amp; code optimizations, the… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/roadmap-idx-autotester/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/rkpareek.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Build a PWA in Vanilla JS]]></title><description><![CDATA[A simple step-by-step tutorial, all done with pure JavaScript, to set up a simple PWA that can be accessed offline using a web app manifest and a service worker.]]></description><link>https://www.loginradius.com/blog/engineering/build-pwa-using-vanilla-javascript/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/build-pwa-using-vanilla-javascript/</guid><category><![CDATA[PWA]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Fri, 26 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/59164c7de73786d49d2361d64689b1c7/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A simple step-by-step tutorial, all done with pure JavaScript, to set up a simple PWA that can be accessed offline using a web app manifest and a service worker. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/build-pwa-using-vanilla-javascript/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[Password hashing with NodeJS]]></title><link>https://www.loginradius.com/blog/engineering/password-hashing-with-nodejs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/password-hashing-with-nodejs/</guid><category><![CDATA[Security]]></category><category><![CDATA[NodeJs]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Thu, 25 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7c5686f355f37377e26ec91cbaa6cbed/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll be implementing authentication with password hashing in a Node.js web application. For this, we’ll be using crypto, a package password hashing for Node.js. The Crypto module for Node JS helps developers to hash user passwords. Pre-requisites:  Basic knowledge… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/password-hashing-with-nodejs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[Online Casino and Gambling Industry Is Gaining Momentum, So Is the Cyber Threat]]></title><description><![CDATA[The online gambling industry, needs to take the necessary steps to build safe and secure platforms for casino operators and consumers.]]></description><link>https://www.loginradius.com/blog/identity/online-casino-and-gambling-cyber-threat/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/online-casino-and-gambling-cyber-threat/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 25 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/19bf37c964e8bdffca34c56ef5ff6584/c0524/Online-Casino-and-Gambling-Industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The online gambling industry, needs to take the necessary steps to build safe and secure platforms for casino operators and consumers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/online-casino-and-gambling-cyber-threat/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction of Idx-Auto-Tester]]></title><link>https://www.loginradius.com/blog/engineering/introduction-of-idx-auto-tester/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-of-idx-auto-tester/</guid><category><![CDATA[Automation]]></category><category><![CDATA[Idx-Auto-Tester]]></category><dc:creator><![CDATA[Himanshi Sharma]]></dc:creator><pubDate>Mon, 22 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4cce23ed76b3e769d45c63bf586f8166/58556/idx-auto-tester.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Idx-Auto-Tester is LoginRadius Identify Experience Automation Framework which refers to IEF Automation, is an open-source automation framework built-in Nightwatch| Node.js tool with delivering all the standard authentication cases of LoginRadius Identity Experience.
This… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-of-idx-auto-tester/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/Himanshi0512.png?size=100v=40</authorImage></item><item><title><![CDATA[How LoginRadius Future-Proofs Consumer Data Privacy and Security]]></title><description><![CDATA[The building blocks that sustain customer loyalty in the long run are authenticity, accountability and excellent customer experience. Organizations need to be clear about how cautious they are when it comes to the privacy and protection of customer data.]]></description><link>https://www.loginradius.com/blog/identity/consumer-data-privacy-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/consumer-data-privacy-security/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[cx]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 17 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3341a4dec7ccc8a337c46d2b6f147200/7f8e9/consumer-data-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The building blocks that sustain customer loyalty in the long run are authenticity, accountability and excellent customer experience. Organizations need to be clear about how cautious they are when it comes to the privacy and protection of customer data. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/consumer-data-privacy-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Twitter authentication with Go Language and Goth]]></title><link>https://www.loginradius.com/blog/engineering/twitter-authentication-with-golang-and-goth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/twitter-authentication-with-golang-and-goth/</guid><category><![CDATA[Go]]></category><category><![CDATA[SocialLogin]]></category><category><![CDATA[Oauth]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Mon, 15 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4f79bafe25a85ffc0b8e8cee3a3e44c8/58556/cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll be implementing authentication via Twitter in a Golang web application. For this, we’ll be using Goth, a social authentication middleware for Golang. Pre-requisites:  Basic knowledge of HTML/Golang Golang should be installed in your system Firstly, We need to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/twitter-authentication-with-golang-and-goth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[Google OAuth2 Authentication in Golang]]></title><description><![CDATA[Learn how to implement Google OAuth2 Authentication in Golang using Goath]]></description><link>https://www.loginradius.com/blog/engineering/google-authentication-with-golang-and-goth/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/google-authentication-with-golang-and-goth/</guid><category><![CDATA[Go]]></category><category><![CDATA[SocialLogin]]></category><category><![CDATA[Oauth]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Thu, 11 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5960f981e6b283300239a1ecf91728b0/e9589/google_golang.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to implement Google OAuth2 Authentication in Golang using Goath &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/google-authentication-with-golang-and-goth/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Authentication and Authorization Defined: What's the Difference? [Infographic]]]></title><description><![CDATA[As companies progress towards digital maturity in times of robust cloud-based systems and stringent online security, authentication and authorization are used in conjunction with each other.]]></description><link>https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/</guid><category><![CDATA[authentication]]></category><category><![CDATA[authorization]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 11 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b562f82442eddeb1196fc242b03f5743/7f8e9/authentication-vs-authorization.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As companies progress towards digital maturity in times of robust cloud-based systems and stringent online security, authentication and authorization are used in conjunction with each other. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LinkedIn Login using Node JS and passport]]></title><description><![CDATA[Learn social login benefits and how we can implement LinkedIn Login on our website or mobile app.]]></description><link>https://www.loginradius.com/blog/engineering/linkedin-login-using-node-passport/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/linkedin-login-using-node-passport/</guid><category><![CDATA[LinkedIn]]></category><category><![CDATA[Login]]></category><category><![CDATA[NodeJs]]></category><category><![CDATA[PassportJS]]></category><dc:creator><![CDATA[Aman Agrawal]]></dc:creator><pubDate>Wed, 10 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/717d9ce34aacf1736c240b0fa8d67551/58556/linkedin_login_node.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn social login benefits and how we can implement LinkedIn Login on our website or mobile app. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/linkedin-login-using-node-passport/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/aman-agrwl.png?size=100v=40</authorImage></item><item><title><![CDATA[Read and Write in a local file with Deno]]></title><link>https://www.loginradius.com/blog/engineering/read-and-write-in-a-local-file-with-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/read-and-write-in-a-local-file-with-deno/</guid><category><![CDATA[Deno]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Tue, 09 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d11d2715523eeb315fdcc7727f48ec20/ad85c/deno_file_system.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we will see how we can read and write into a local file with the help of Deno First, we will create a program which will read multiple quotes from a text file and then print a random quote on our screen  Then we will take input from the user in the command line and… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/read-and-write-in-a-local-file-with-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Build A Simple CLI Tool using Deno]]></title><link>https://www.loginradius.com/blog/engineering/build-a-cli-tool-using-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/build-a-cli-tool-using-deno/</guid><category><![CDATA[Deno]]></category><category><![CDATA[CLI]]></category><category><![CDATA[Programming]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Mon, 08 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c24ce77aa8d49761ef8a949cc2a9e06c/58556/cli-tool.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is Deno? Deno is a JavaScript/TypeScript runtime with secure defaults and great developer experience. It&apos;s built on V8, Rust, and Tokio.
I suggest you watch these talks by Ryan: He talks about his mistakes with Nodejs here and a more in-depth look into deno here Features… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/build-a-cli-tool-using-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[Create REST API using deno ]]></title><link>https://www.loginradius.com/blog/engineering/create-rest-api-in-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/create-rest-api-in-deno/</guid><category><![CDATA[Deno]]></category><category><![CDATA[REST]]></category><category><![CDATA[API]]></category><dc:creator><![CDATA[Aman Agrawal]]></dc:creator><pubDate>Mon, 08 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4a65a81c1ab5e2211f19e9aeeb888f6b/58556/task.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Deno, the creation of Ryan Dahl is a simple, modern, and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust. As Deno 1.0.0 has released, there is much-awaited curiosity amongst developers around working with this new stack. When it comes to learning a… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/create-rest-api-in-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/aman-agrwl.png?size=100v=40</authorImage></item><item><title><![CDATA[Automation for Identity Experience Framework is now open-source !!!]]></title><link>https://www.loginradius.com/blog/engineering/opensource-automation-for-identity-experience-framework/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/opensource-automation-for-identity-experience-framework/</guid><category><![CDATA[OpenSource]]></category><category><![CDATA[Automation]]></category><dc:creator><![CDATA[Sudhey Sharma]]></dc:creator><pubDate>Thu, 04 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/51af1e97aec2b39f25f6184d64fe646c/58556/automation_ief.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We&apos;re delightfully announcing the open source automation suite to test all the standard authentication cases of LoginRadius Identity Experience Framework.
The details have been given below. Link to the repository: idx auto tester About LoginRadius Identity Experience Framework… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/opensource-automation-for-identity-experience-framework/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/sudheysharma.png?size=100v=40</authorImage></item><item><title><![CDATA[Creating a Web Application using Deno]]></title><link>https://www.loginradius.com/blog/engineering/a-webapp-in-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/a-webapp-in-deno/</guid><category><![CDATA[Deno]]></category><dc:creator><![CDATA[Mohammed Modi]]></dc:creator><pubDate>Wed, 03 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/86f3d496668dfb6a4e294c162db964f1/58556/deno.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hello, let&apos;s create a simple web app using deno, In this blog, I will be using the Deno Third-Party Module called abc for creating a simple web application. I am assuming that you are familiar with the basic setup of deno. If not you can start with basic deno installation from… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/a-webapp-in-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/mohammed786.png?size=100v=40</authorImage></item><item><title><![CDATA[Hello world with Deno]]></title><link>https://www.loginradius.com/blog/engineering/hello-world-deno/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/hello-world-deno/</guid><category><![CDATA[Deno]]></category><category><![CDATA[HelloWorld]]></category><category><![CDATA[NodeJs]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Tue, 02 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/70351d960fd94ea6641dc19419a97bbc/58556/deno.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hello, Deno Deno is a new platform for writing applications using JavaScript and TypeScript. It is based on the V8 JavaScript engine and the Rust. Deno’s lowest level binding layer to the system is tied to promises (called ops). Deno is secure by default, provides first-class… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/hello-world-deno/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[Facebook authentication using NodeJS and PassportJS]]></title><link>https://www.loginradius.com/blog/engineering/facebook-authentication-using-node-and-passport/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/facebook-authentication-using-node-and-passport/</guid><category><![CDATA[Facebook]]></category><category><![CDATA[NodeJs]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[PassportJS]]></category><dc:creator><![CDATA[Aman Agrawal]]></dc:creator><pubDate>Mon, 01 Jun 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/adba71048e93f4d775b486dff18c1ca8/58556/facebook_node_passport.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social login is the need for simplifying your registration process and increasing the conversion rates. Here we will be implementing Facebook Login  using NodeJS and Passport.  Passport is authentication middleware for Node, which authenticates requests and delegates all other… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/facebook-authentication-using-node-and-passport/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/aman-agrwl.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Launches Consent Management to Support the EU's GDPR Compliance]]></title><description><![CDATA[When the General Data Protection Regulation (GDPR) was officially laid out, it sparked an increasing need to re-consider their security arrangements for organisations running on Customer Identity & Access Management (CIAM) solutions.]]></description><link>https://www.loginradius.com/blog/identity/consent-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/consent-management/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[consent management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 May 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/38970150e5b94b9c005f018579fcdbf9/c0524/Consent-Management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When the General Data Protection Regulation (GDPR) was officially laid out, it sparked an increasing need to re-consider their security arrangements for organisations running on Customer Identity &amp; Access Management (CIAM) solutions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/consent-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Streaming Applications: How to Secure Your Customer Data]]></title><description><![CDATA[OTT streaming apps should know how to mitigate data theft. Using a robust identity management solution in online streaming services helps secure digital identities.]]></description><link>https://www.loginradius.com/blog/identity/streaming-applications-secure-customer-data/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/streaming-applications-secure-customer-data/</guid><category><![CDATA[data security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 21 May 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee364b2cb64da194a090d7c64fbaba1d/7f8e9/secure-customer-data.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; OTT streaming apps should know how to mitigate data theft. Using a robust identity management solution in online streaming services helps secure digital identities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/streaming-applications-secure-customer-data/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>13</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Protecting Organization From Cyber-Threats: Business at Risk During COVID-19]]></title><description><![CDATA[Cyber risks have always been a big deal for corporations. With the self-quarantined world population at home and the stock market succumbing to the ill-fated Covid-19.]]></description><link>https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 18 May 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3215c52cbabf88766fcec82fd858a33e/7f8e9/cyber-threats.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cyber risks have always been a big deal for corporations. With the self-quarantined world population at home and the stock market succumbing to the ill-fated Covid-19. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius China CIAM for Businesses to Benefit From Its Lucrative Market]]></title><description><![CDATA[With our LoginRadius China CIAM platform, we aim to help businesses securely manage digital identities within the restrictive borders of mainland China.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-ciam-china-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-ciam-china-business/</guid><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 14 May 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ef16f4d047c68db7667dd53fb6ecf077/58556/LoginRadius-China-CIAM.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With our LoginRadius China CIAM platform, we aim to help businesses securely manage digital identities within the restrictive borders of mainland China. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-ciam-china-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Enhancing Customer Experience in Retail Industry]]></title><description><![CDATA[Not only does a perfect plan for customer experience rely on the product, store, and customers, but also on how companies smartly coordinate the entities listed. They need to integrate customer service through multiple genres of retail.]]></description><link>https://www.loginradius.com/blog/growth/customer-experience-retail-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-experience-retail-industry/</guid><category><![CDATA[cx]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 05 May 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4468a0abb13de4429a53ead566673f96/7f8e9/retail-cx.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Not only does a perfect plan for customer experience rely on the product, store, and customers, but also on how companies smartly coordinate the entities listed. They need to integrate customer service through multiple genres of retail. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-experience-retail-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Financial Industry Needs an Identity Management System Now More Than Ever]]></title><description><![CDATA[A robust identity management system helps financial organizations remain compliant and conduct business in a secure environment.]]></description><link>https://www.loginradius.com/blog/identity/financial-industry-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/financial-industry-identity-management/</guid><category><![CDATA[compliance]]></category><category><![CDATA[authentication]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 30 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/68059fbdcf1e8254b46c8fceeda0b1c8/7f8e9/financial-industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A robust identity management system helps financial organizations remain compliant and conduct business in a secure environment. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/financial-industry-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcement - LoginRadius Now Supports PIN Login with Enhanced Features]]></title><description><![CDATA[LoginRadius is a rapidly-expanding identity management platform. And this time, for its current and new clients, the cloud-based client identity and access management solution has introduced a PIN Login authentication environment.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-pin-based-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-pin-based-authentication/</guid><category><![CDATA[pin authentication]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 28 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/55974b938473b376b80bd3688ec14362/c0524/LoginRadius-Pin-Authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius is a rapidly-expanding identity management platform. And this time, for its current and new clients, the cloud-based client identity and access management solution has introduced a PIN Login authentication environment. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-pin-based-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[StackExchange - The 8 best resources every developer must follow]]></title><link>https://www.loginradius.com/blog/engineering/stackexchange-8-best-resources-every-developer-must-follow/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/stackexchange-8-best-resources-every-developer-must-follow/</guid><category><![CDATA[Programmer]]></category><category><![CDATA[Skills]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Sat, 25 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e1dbea7a93cee26d0e479f03722ea24b/58556/8-stackexchange-resources-dev-follow.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a developer, you should be familiar with StackExchange. There are tons of resources available on there about software development and programming. Out of everything, I have compiled a list of the top 8 resources that I find helpful. These resources cover a wide range of topics… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/stackexchange-8-best-resources-every-developer-must-follow/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[LoginRadius Bans Video Conferencing App ‘Zoom’ Over Security Concerns]]></title><description><![CDATA[Because of security issues, LoginRadius has forbidden the use of the Zoom video conferencing software by LoginRadius employees.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-bans-zoom/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-bans-zoom/</guid><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 23 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4ba67e8dd82e54a1ccb9b09738bdf03f/58556/LoginRadius-Bans-Zoom.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Because of security issues, LoginRadius has forbidden the use of the Zoom video conferencing software by LoginRadius employees. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-bans-zoom/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Corporate Account Takeover Attacks: Detecting and Preventing it]]></title><description><![CDATA[How do you defend your company against a Corporate Account Takeover (CATO) fraud with the COVID-19 pandemic causing workers to stay indoors?]]></description><link>https://www.loginradius.com/blog/identity/corporate-account-takeover-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/corporate-account-takeover-attacks/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 16 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/750e5cccba4001af2b446b58420c5521/7f8e9/corporate-accnt-takeover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; How do you defend your company against a Corporate Account Takeover (CATO) fraud with the COVID-19 pandemic causing workers to stay indoors? &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/corporate-account-takeover-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Marriott Data Breach 2020: 5.2 Million Guest Records Were Stolen]]></title><description><![CDATA[Marriott International experienced a new data breach in mid-January 2020, which affected about 5.2 million guests.]]></description><link>https://www.loginradius.com/blog/identity/marriott-data-breach-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/marriott-data-breach-2020/</guid><category><![CDATA[other]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 13 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0723a654ea87ebf4c412dc3ab1a6bd18/c0524/marriott-data-breach.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Marriott International experienced a new data breach in mid-January 2020, which affected about 5.2 million guests. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/marriott-data-breach-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How LoginRadius Help Retail and E-commerce Industry to Manage Customer Identities]]></title><description><![CDATA[As the retail and e-commerce industry enters the modern digitalization age, a giant leap forward has been made by consumer experience when engaging with a brand. In reality, it has moved goods and services into the overall shopping experience as a secondary entity. For customers, they are no longer the motivating impetus to approach a store.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-ciam-retail-ecommerce-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-ciam-retail-ecommerce-business/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 08 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/08771c70a587372c7b3d1bd64b08721e/7f8e9/retail-ecommerce.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As the retail and e-commerce industry enters the modern digitalization age, a giant leap forward has been made by consumer experience when engaging with a brand. In reality, it has moved goods and services into the overall shopping experience as a secondary entity. For customers, they are no longer the motivating impetus to approach a store. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-ciam-retail-ecommerce-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Deliver Exceptional Omnichannel Customer Experience [Infographic]]]></title><description><![CDATA[A multifold approach to advertising, selling, and helping consumers through various marketing touchpoints is an omnichannel consumer experience. To learn more, check out the infographic.]]></description><link>https://www.loginradius.com/blog/growth/omnichannel-customer-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/omnichannel-customer-experience/</guid><category><![CDATA[omnichannel cx]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[convenience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 01 Apr 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5df03f5849554985ac08025f1138656f/7f8e9/omnichannel-experience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A multifold approach to advertising, selling, and helping consumers through various marketing touchpoints is an omnichannel consumer experience. To learn more, check out the infographic. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/omnichannel-customer-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Announcing New Look of LoginRadius]]></title><description><![CDATA[LoginRadius is delighted to announce that we now have a new logo.]]></description><link>https://www.loginradius.com/blog/identity/announcing-new-look-of-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/announcing-new-look-of-loginradius/</guid><category><![CDATA[LoginRadius]]></category><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 25 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b196244089e513074aca00b6736f8973/c0524/Announcing-New-Look-of-LoginRadius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius is delighted to announce that we now have a new logo. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/announcing-new-look-of-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[OAuth implementation with Node.js and Github]]></title><link>https://www.loginradius.com/blog/engineering/oauth-implemenation-using-node/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/oauth-implemenation-using-node/</guid><category><![CDATA[Oauth]]></category><category><![CDATA[NodeJs]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Sun, 22 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bb5df84ab7808c0a554f33a2c8cb76c0/58556/oauth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll be implementing OAuth by Github in a Node.js Application Before You Get Started This tutorial assumes you have: Basic knowledge of HTML/CSS Basic understanding of OAuth A good understanding of JavaScript and Node.js Latest Node.js version installed on your… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/oauth-implemenation-using-node/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[NodeJS and MongoDB application authentication by JWT]]></title><link>https://www.loginradius.com/blog/engineering/nodejs-and-mongodb-application-authentication-by-jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/nodejs-and-mongodb-application-authentication-by-jwt/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[JWT]]></category><category><![CDATA[MongoDB]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[JSON Web Token]]></category><dc:creator><![CDATA[Ashish Sharma]]></dc:creator><pubDate>Fri, 20 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2b39d6f99b1ca5d4bc89d3bfccb6e29d/e9589/jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this blog, we’ll be implementing authentication with JWT  in a NodeJS web application. For this, we’ll be using jsonwebtoken package  What is JWT? JWT(JSON Web Token) is a token format. It is digitally-signed, self-contained, and compact. It provides a convenient mechanism for… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/nodejs-and-mongodb-application-authentication-by-jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/ashish8947.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak]]></title><description><![CDATA[COVID-19 is a global epidemic which demands action that is decisive and robust.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-business-continuity-covid-19-outbreak/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-business-continuity-covid-19-outbreak/</guid><category><![CDATA[LoginRadius]]></category><category><![CDATA[industry-news]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 17 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cbe783d369681847892f38c91f3084cf/c0524/loginradius-business-continuity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; COVID-19 is a global epidemic which demands action that is decisive and robust. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-business-continuity-covid-19-outbreak/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Improving Customer Experience in the Hospitality Industry]]></title><description><![CDATA[It has always been about luxury, pleasure, and excellent customer service in the hospitality industry. Modern guests travel for both company and fun. They also want business owners to better connect and understand them well.]]></description><link>https://www.loginradius.com/blog/growth/improve-customer-experience-hospitality-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improve-customer-experience-hospitality-industry/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[cx]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 13 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/428d82fb05d5e5e6ff4210e69f6b6161/7f8e9/hospitality.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It has always been about luxury, pleasure, and excellent customer service in the hospitality industry. Modern guests travel for both company and fun. They also want business owners to better connect and understand them well. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improve-customer-experience-hospitality-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Unlock the Future of Smart Cities]]></title><description><![CDATA[With population growth and the expansion of public services, cities need to be innovative about how to provide services to all people without compromising service quality. There is a need for a single platform where all facilities are centralised and customer experience is considered. Below, for municipalities to follow, we'll look at some examples and best practises.]]></description><link>https://www.loginradius.com/blog/identity/unlock-the-future-of-smart-cities/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/unlock-the-future-of-smart-cities/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[digital identity]]></category><category><![CDATA[sso]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 13 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e1e2d4dfaf4314477f919d890c2a6cdd/7f8e9/future-of-smart-cities.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With population growth and the expansion of public services, cities need to be innovative about how to provide services to all people without compromising service quality. There is a need for a single platform where all facilities are centralised and customer experience is considered. Below, for municipalities to follow, we&apos;ll look at some examples and best practises. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/unlock-the-future-of-smart-cities/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How LoginRadius Helps Enterprises Stay CCPA Compliant in 2020]]></title><description><![CDATA[As the risk of data misuse is rising, more and more enterprises are trying to comply with current data protection and regulatory enforcement.]]></description><link>https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 06 Mar 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3da77fd0181d28bfc0a067549277a041/7f8e9/ccpa-compliant.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As the risk of data misuse is rising, more and more enterprises are trying to comply with current data protection and regulatory enforcement. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Social Login?]]></title><description><![CDATA[Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.]]></description><link>https://www.loginradius.com/blog/identity/what-is-social-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-social-login/</guid><category><![CDATA[social login]]></category><category><![CDATA[identity verification]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Vaibhav Jain]]></dc:creator><pubDate>Fri, 28 Feb 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/76a63a56c76fb78c41033caa51ea6e75/7f8e9/social-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-social-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vaibhav Jain&amp;size=100</authorImage></item><item><title><![CDATA[Digital Trends Transforming the Media and Entertainment Industry in 2020]]></title><description><![CDATA[The worldwide media and entertainment industry is going through a huge transformation at the moment. 2020 aims to be the year of digital change in the media and entertainment sector with a large-scale roll-out of technology.]]></description><link>https://www.loginradius.com/blog/growth/customer-experience-media-entertainment-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/customer-experience-media-entertainment-industry/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 25 Feb 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/735505ee6f15bc08ee45906dd6a78b64/7f8e9/media-industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The worldwide media and entertainment industry is going through a huge transformation at the moment. 2020 aims to be the year of digital change in the media and entertainment sector with a large-scale roll-out of technology. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/customer-experience-media-entertainment-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Working with AWS Lambda and SQS]]></title><link>https://www.loginradius.com/blog/engineering/working-with-aws-lambda-and-sqs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/working-with-aws-lambda-and-sqs/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[General]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ee2d9bd3978930dc685480ceac45286e/b594c/blog-aws-lambda.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This blog is a short guide on implementing AWS Lambda and SQS together. First we’ll introduce these technologies and explain why they work well together, then walkthrough some configurations and invocation using a simple Nodejs script.  What are they?
AWS Lambda is a popular… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/working-with-aws-lambda-and-sqs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Google OAuth2 Authentication in NodeJS - A Guide to Implementing OAuth in Node.js]]></title><description><![CDATA[Learn how to implement Google OAuth2 Authentication in NodeJS using Passport]]></description><link>https://www.loginradius.com/blog/engineering/google-authentication-with-nodejs-and-passportjs/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/google-authentication-with-nodejs-and-passportjs/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[SocialLogin]]></category><category><![CDATA[Oauth]]></category><dc:creator><![CDATA[Puneet Singh]]></dc:creator><pubDate>Wed, 12 Feb 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/af2ca4c70d0c3c2c4c6726e14a1b25ad/e9589/google_cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to implement Google OAuth2 Authentication in NodeJS using Passport &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/google-authentication-with-nodejs-and-passportjs/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/puneetsingh24.png?size=100v=40</authorImage></item><item><title><![CDATA[Improving Customer Experience in the Gaming Industry]]></title><description><![CDATA[In order to prosper in the gaming industry, you need to offer a smooth user interface. Learn how it is possible to use emerging technologies to draw and retain more clients.]]></description><link>https://www.loginradius.com/blog/growth/improving-customer-experience-in-the-gaming-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improving-customer-experience-in-the-gaming-industry/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 27 Jan 2020 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e4060e876c9792f088e29757f041c689/7f8e9/gaming-industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In order to prosper in the gaming industry, you need to offer a smooth user interface. Learn how it is possible to use emerging technologies to draw and retain more clients. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improving-customer-experience-in-the-gaming-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity as a Service (IDAAS): Managing Digital Identities (Updated)]]></title><description><![CDATA[Identity as a service (IDaaS) refers to services provided via the cloud or through SaaS (software-as-a-service) systems for identity and access management. It provides cloud-based authentication provided and managed on a subscription basis by third-party providers.]]></description><link>https://www.loginradius.com/blog/identity/identity-as-a-service-for-business/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-as-a-service-for-business/</guid><category><![CDATA[idaas]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 25 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4545cde6890d02351eb7cdba48dbe112/7f8e9/idaas-business.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Identity as a service (IDaaS) refers to services provided via the cloud or through SaaS (software-as-a-service) systems for identity and access management. It provides cloud-based authentication provided and managed on a subscription basis by third-party providers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-as-a-service-for-business/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Worst Passwords of 2019]]></title><description><![CDATA[Overall, a major challenge for corporations is poor passwords combined with smart hackers. You need cybersecurity that prevents access to your confidential data to protect your business from expensive hacks and breaches. Choose a globally-certified CIAM solution like LoginRadius for state-of-the-art safety and increased customer experience.]]></description><link>https://www.loginradius.com/blog/identity/worst-passwords-list-2019/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/worst-passwords-list-2019/</guid><category><![CDATA[passwordless login]]></category><category><![CDATA[password management]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 23 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cf8b7e1e5cc06a1c8074dc343cc7f342/7f8e9/worst-psswrd-list.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Overall, a major challenge for corporations is poor passwords combined with smart hackers. You need cybersecurity that prevents access to your confidential data to protect your business from expensive hacks and breaches. Choose a globally-certified CIAM solution like LoginRadius for state-of-the-art safety and increased customer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/worst-passwords-list-2019/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Gets into the Christmas Spirit (of Giving)]]></title><description><![CDATA[We want to give the Union Gospel Mission (UGM) a huge thank you and shout out for giving us the chance to give the world back!]]></description><link>https://www.loginradius.com/blog/growth/christmas-spirit-of-giving/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/christmas-spirit-of-giving/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 17 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f18a5a3da74f18941615facdf8f24952/7f8e9/christmas-spirit-of-giving.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We want to give the Union Gospel Mission (UGM) a huge thank you and shout out for giving us the chance to give the world back! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/christmas-spirit-of-giving/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Digital Privacy: Securing Consumer Privacy with LoginRadius]]></title><description><![CDATA[Concerns over digital data security have always been at the forefront of a CIO 's mind. But it generated fresh concern when the 2017 Equifax hack struck. Here's how executives work to protect the digital privacy of consumer data across business verticals.]]></description><link>https://www.loginradius.com/blog/identity/digital-privacy-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-privacy-best-practices/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 12 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/035b5c33645cd5126ea97720f0dd7048/7f8e9/digital-privacy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Concerns over digital data security have always been at the forefront of a CIO &apos;s mind. But it generated fresh concern when the 2017 Equifax hack struck. Here&apos;s how executives work to protect the digital privacy of consumer data across business verticals. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-privacy-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Custom Encoders in the Mongo Go Driver]]></title><link>https://www.loginradius.com/blog/engineering/custom-encoders-in-the-mongo-go-driver/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/custom-encoders-in-the-mongo-go-driver/</guid><category><![CDATA[Go]]></category><category><![CDATA[Golang]]></category><category><![CDATA[MongoDriver]]></category><dc:creator><![CDATA[Chris Yee]]></dc:creator><pubDate>Tue, 03 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5101a7134dd4fbb552b2c92ea342e1e4/58556/mongo-drivers.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The official supported drivers for Mongo for Go have been officially released for several months now and is slowly seeing more usage. Although many of the features of standard Mongo drivers have been implemented within the supported driver, the documentation for a majority of the… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/custom-encoders-in-the-mongo-go-driver/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Yee&amp;size=100</authorImage></item><item><title><![CDATA[React's Reconciliation Algorithm]]></title><link>https://www.loginradius.com/blog/engineering/reacts-reconciliation-algorithm/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/reacts-reconciliation-algorithm/</guid><category><![CDATA[React]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 03 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b049b298332c75b5f5768c066fe56fa/58556/react-fiber.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Overview   The “reconciliation” algorithm in React is how the decision to re-render the component is made. In the browser, DOM manipulation is expensive and time consuming, both in mounting and unmounting. Part of what makes React very performant is its reconciliation algorithm… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/reacts-reconciliation-algorithm/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[One World Identity Report Names LoginRadius a Customer Identity and Access Management (CIAM) Industry Leader]]></title><description><![CDATA[LoginRadius is one of 415 identity companies chosen to be included in the study from a pool of over 2,000.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-named-ciam-leader-owi/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-named-ciam-leader-owi/</guid><category><![CDATA[media-and-publication]]></category><category><![CDATA[LoginRadius]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 02 Dec 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/57a7390f435ce9a0c99194bcda65a867/7f8e9/blog-graphic-one-world-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius is one of 415 identity companies chosen to be included in the study from a pool of over 2,000. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-named-ciam-leader-owi/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Ways to Enhance Customer Experience in E-commerce]]></title><description><![CDATA[A smart e-commerce customer service strategy is as critical as a marketing strategy when it comes to growing your business. You will get 360-degree customer profiling, with 100% customer consent, at all touchpoints, with a customer identity and access management solution.]]></description><link>https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/</guid><category><![CDATA[cx]]></category><category><![CDATA[ecommerce]]></category><category><![CDATA[digital identity]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 28 Nov 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/650e7d9f47a06d9982d13d56894deab2/7f8e9/customer-experience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A smart e-commerce customer service strategy is as critical as a marketing strategy when it comes to growing your business. You will get 360-degree customer profiling, with 100% customer consent, at all touchpoints, with a customer identity and access management solution. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[NaN in JavaScript: An Essential Guide]]></title><description><![CDATA[In this guide you'll learn about JavasScript NaN, how to verify whether a value is NaN, and how to manage NaN effectively.]]></description><link>https://www.loginradius.com/blog/engineering/checking-for-nan-in-javascript/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/checking-for-nan-in-javascript/</guid><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Greg Sakai]]></dc:creator><pubDate>Fri, 22 Nov 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/64b659badd7a09c3d955b9c49a7f271f/1f5c5/numbers-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this guide you&apos;ll learn about JavasScript NaN, how to verify whether a value is NaN, and how to manage NaN effectively. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/checking-for-nan-in-javascript/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Greg Sakai&amp;size=100</authorImage></item><item><title><![CDATA[7 Benefits of Single Sign-On (SSO) and Why Your Business Needs It]]></title><description><![CDATA[Now that more enterprises are moving to the cloud, customers expect seamless access from anywhere, anywhere, and on any computer, to multiple applications. Likewise, as most large corporations have hundreds of touchpoints under different labels, trying to handle them all will strain their IT departments.]]></description><link>https://www.loginradius.com/blog/identity/benefits-single-sign-on/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/benefits-single-sign-on/</guid><category><![CDATA[single sign on]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 12 Nov 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/56a2932000a4dfedbc029cd6315bc440/7f8e9/benefits-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Now that more enterprises are moving to the cloud, customers expect seamless access from anywhere, anywhere, and on any computer, to multiple applications. Likewise, as most large corporations have hundreds of touchpoints under different labels, trying to handle them all will strain their IT departments. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/benefits-single-sign-on/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[SDK Version 10.0.0]]></title><link>https://www.loginradius.com/blog/engineering/sdk-version-10-0-0/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/sdk-version-10-0-0/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[SDK]]></category><category><![CDATA[Version]]></category><dc:creator><![CDATA[Indrasen Kumar]]></dc:creator><pubDate>Thu, 31 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b5a4efdaf136c68376dc3010819e3e7e/1f5c5/SDK.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We&apos;re delightfully Announcing SDK Version 10.0.0.  This full-version release includes major changes with several improvements and optimizations, the details have been given below. For complete information please visit LoginRadius API documents. New Features Added: Added PIN… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/sdk-version-10-0-0/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/indrasen715.png?size=100v=40</authorImage></item><item><title><![CDATA[Getting Started with gRPC - Part 1 Concepts]]></title><link>https://www.loginradius.com/blog/engineering/getting-started-with-grpc-part-1-concepts/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/getting-started-with-grpc-part-1-concepts/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[gRPC]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Wed, 30 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/23fcca8d49d96b5e61cc171769c93b38/a55b6/grpc.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This blog is part 1 of a series on gRPC. Part 1 will go over some important concepts, part 2 will be a walkthrough of a client-server implementation in Go, and part 3 will be about LoginRadius&apos; experience migrating to gRPC! gRPC gRPC, simply put, is just another way to send data… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/getting-started-with-grpc-part-1-concepts/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Introduction to Cross-Site Request Forgery (CSRF)]]></title><link>https://www.loginradius.com/blog/engineering/introduction-to-cross-site-request-forgery-csrf/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-to-cross-site-request-forgery-csrf/</guid><category><![CDATA[CSRF]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Wed, 30 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/45655fcaf75e8e3352165b60c7cac47b/1f5c5/crosspath.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Introduction Cross-Site Request Forgery (CSRF) is a common web application attack where a victims’ authenticated session becomes compromised. This attack essentially tricks a victim into performing unintended tasks on a website they are authenticated in. There are variations to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-to-cross-site-request-forgery-csrf/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Cloud Security Challenges Today: Expert Advice on Keeping your Business Safe]]></title><description><![CDATA[For business owners and IT professionals around the world, security in the cloud is still a pressing concern. There are a lot of things you need to consider when moving your business to a cloud environment; from data protection, getting the right platform for your needs, how to protect data during transit, and more.]]></description><link>https://www.loginradius.com/blog/identity/cloud-computing-security-challenges/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/cloud-computing-security-challenges/</guid><category><![CDATA[cloud computing]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 24 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4eb7a20492e18259ebaaf31842d03695/9fd83/cloud-computing-security-challenges-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; For business owners and IT professionals around the world, security in the cloud is still a pressing concern. There are a lot of things you need to consider when moving your business to a cloud environment; from data protection, getting the right platform for your needs, how to protect data during transit, and more. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/cloud-computing-security-challenges/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Role of Passwordless Authentication in Securing Digital Identity]]></title><description><![CDATA[The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?]]></description><link>https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[digital identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4e610fa1793a4c84532bd855d762bbbf/58556/passwordless-auth.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much? &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius presents at KuppingerCole Consumer Identity World]]></title><description><![CDATA[We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below.]]></description><link>https://www.loginradius.com/blog/identity/kuppingercole-ciw-presentation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/kuppingercole-ciw-presentation/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f623b52e92b5b2b069bd4bd056b1ca35/7f8e9/kuppingercole-ciw-presentation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/kuppingercole-ciw-presentation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Digital Identity Management: 5 Ways to Win Customer Trust]]></title><description><![CDATA[In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely.]]></description><link>https://www.loginradius.com/blog/identity/digital-identity-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-identity-management/</guid><category><![CDATA[digital identity management]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 01 Oct 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8714c2a907a14fa58a5ebfc556e430b7/7f8e9/digital-identity-mngmnt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-identity-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Throw A Tiki Tech Party]]></title><description><![CDATA[Except that you hop from start-up offices to start-up offices, Neighborhood Crawl is like a pub crawl. It's an interesting open house event where tourists can check out various start-ups. More than a dozen startups have opened their doors, so thank you to anyone who has taken the time to check us out!]]></description><link>https://www.loginradius.com/blog/growth/how-to-throw-a-tiki-tech-party/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-throw-a-tiki-tech-party/</guid><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Fri, 20 Sep 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d8e58222783279e1030beb7197d352d9/58556/how-to-throw-a-tiki-tech-party.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Except that you hop from start-up offices to start-up offices, Neighborhood Crawl is like a pub crawl. It&apos;s an interesting open house event where tourists can check out various start-ups. More than a dozen startups have opened their doors, so thank you to anyone who has taken the time to check us out! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-throw-a-tiki-tech-party/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[CCPA vs GDPR: Global Compliance Guide [Infographic]]]></title><description><![CDATA[It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.]]></description><link>https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/</guid><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[data security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 18 Sep 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/19b671e1d4113d48d7fa1cdc7661bedd/7f8e9/ccpa-vs-gdpr.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It&apos;s natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Credential Stuffing: How To Detect And Prevent It]]></title><description><![CDATA[Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.]]></description><link>https://www.loginradius.com/blog/identity/prevent-credential-stuffing-attacks/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/prevent-credential-stuffing-attacks/</guid><category><![CDATA[data security]]></category><category><![CDATA[mfa]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 12 Sep 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/225abc42eb575e94c0398db1df49673f/7f8e9/credential-stuffing-attacks.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/prevent-credential-stuffing-attacks/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A History of Human Identity in Pictures Part 3]]></title><description><![CDATA[We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.]]></description><link>https://www.loginradius.com/blog/identity/history-human-identity-part-3/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/history-human-identity-part-3/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/27a047d3678bcbcd5a2ddaf7c6594e38/c0524/history-human-identity-part-3.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/history-human-identity-part-3/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A History of Human Identity in Pictures  Part 2]]></title><description><![CDATA[We covered how identity started in ancient times in Part I of The History of Identity. We concentrate on present times for Part II, where personal names are now considered central to identification and integrity.]]></description><link>https://www.loginradius.com/blog/identity/history-identity-part-2/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/history-identity-part-2/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 20 Aug 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4bab77ebce2317c97b81926bfdde93a6/c0524/history-identity-part-2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We covered how identity started in ancient times in Part I of The History of Identity. We concentrate on present times for Part II, where personal names are now considered central to identification and integrity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/history-identity-part-2/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A History of Human Identity in Pictures - Part 1]]></title><description><![CDATA[The definition of human identity extends back to unrecorded history for thousands of years. We used language, artefacts, and records long before our identities were digitised and stored in databases to reflect and affirm our individuality.]]></description><link>https://www.loginradius.com/blog/identity/history-identity-part-1/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/history-identity-part-1/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 07 Aug 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/36ae89aa2233f3d7f6e12fed38a77825/c0524/history-identity-part-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The definition of human identity extends back to unrecorded history for thousands of years. We used language, artefacts, and records long before our identities were digitised and stored in databases to reflect and affirm our individuality. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/history-identity-part-1/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Introduction to Web Accessibility with Semantic HTML5]]></title><link>https://www.loginradius.com/blog/engineering/introduction-to-web-accessibility-with-semantic-html5/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/introduction-to-web-accessibility-with-semantic-html5/</guid><category><![CDATA[HTML5]]></category><category><![CDATA[HTML]]></category><category><![CDATA[Web Accessibility]]></category><category><![CDATA[Semantic HTML5]]></category><dc:creator><![CDATA[Greg Sakai]]></dc:creator><pubDate>Wed, 24 Jul 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/70f4300c1f86c6d8e337f40979e66dea/58556/handicapped.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is Web Accessibility? Web Accessibility (often stylized “a11y”), is the practice of ensuring that your websites and web applications are accessible by people with disabilities of many kinds. Some examples of common disabilities which we need to consider are: Blindness and… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/introduction-to-web-accessibility-with-semantic-html5/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Greg Sakai&amp;size=100</authorImage></item><item><title><![CDATA[JavaScript Events: Bubbling, Capturing, and Propagation]]></title><link>https://www.loginradius.com/blog/engineering/javascript-events-bubbling-capturing-and-propagation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/javascript-events-bubbling-capturing-and-propagation/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[JavaScript Events]]></category><dc:creator><![CDATA[Greg Sakai]]></dc:creator><pubDate>Mon, 22 Jul 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/53a3895e9c38870937a9136813ac9e10/0ce14/bubbles.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A basic example of a JavaScript event Events, in JavaScript, are occurrences that can trigger certain functionality, and can result in certain behaviour. A common example of an event, is a “click”, or a “hover”. You can set listeners to watch for these events that will trigger… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/javascript-events-bubbling-capturing-and-propagation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Greg Sakai&amp;size=100</authorImage></item><item><title><![CDATA[What is Multi Factor Authentication (MFA) and How does it Work?]]></title><description><![CDATA[In today’s digital landscape, cybersecurity threats are evolving rapidly. Businesses and individuals alike need stronger security measures to protect sensitive data. A highly effective method to improve security is through Multi-Factor Authentication (MFA). But what is multi factor authentication, and how does it work? Let’s dive into the details.]]></description><link>https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/</guid><category><![CDATA[mfa]]></category><category><![CDATA[authentication]]></category><category><![CDATA[ciam solution]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 28 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bebdf0e50e1df0f97ff4169608b4f233/58556/mfa-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In today’s digital landscape, cybersecurity threats are evolving rapidly. Businesses and individuals alike need stronger security measures to protect sensitive data. A highly effective method to improve security is through Multi-Factor Authentication (MFA). But what is multi factor authentication, and how does it work? Let’s dive into the details. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[3 Simple Ways to Secure Your Websites/Applications]]></title><link>https://www.loginradius.com/blog/engineering/3-simple-ways-to-secure-your-websites-applications/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/3-simple-ways-to-secure-your-websites-applications/</guid><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Mon, 24 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5a3022253d6646c0ce3939c478b4481e/ad85c/hacker.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is hard to write 100% holes-free code, no matter how hard you try. Sometimes it is not even your own fault (language implementation, server setups, etc.) and those factors are likely out of your control. That being said, as developers, we should strive to write our code as… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/3-simple-ways-to-secure-your-websites-applications/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Failover Systems and LoginRadius' 99.99% Uptime]]></title><link>https://www.loginradius.com/blog/engineering/failover-systems-and-loginradius-99-99-uptime/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/failover-systems-and-loginradius-99-99-uptime/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Ruben Gonzalez]]></dc:creator><pubDate>Mon, 24 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/aa689bef0926b16dc0f50c38ca2e3f1c/18421/tech.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Do you remember the Amazon outage that affected several high-profile customers back in 2011? On April 21st, widely-used sites such as Reddit and Quora were brought down, and many others experienced latency or were knocked offline, too. Early that morning, as part of normal… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/failover-systems-and-loginradius-99-99-uptime/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/rubenprograms.png?size=100v=40</authorImage></item><item><title><![CDATA[Why LoginRadius Is the Best Akamai Identity Cloud (Janrain) Alternative]]></title><description><![CDATA[Akamai purchased Janrain in January 2019 and renamed its CIAM solution Identity Cloud, a platform designed to strengthen security access controls and identity management.]]></description><link>https://www.loginradius.com/blog/identity/best-janrain-alternative/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-janrain-alternative/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 24 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f0a4b456371af805e58752d5abeee474/7f8e9/janrain-feature.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Akamai purchased Janrain in January 2019 and renamed its CIAM solution Identity Cloud, a platform designed to strengthen security access controls and identity management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-janrain-alternative/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[5 Reasons To Know Why B2C Enterprises Should Use Single Sign-On]]></title><description><![CDATA[Today, consumers want to log into one place and access all of their favorite sites and services using their preferred login credentials. Single sign-on is a great way to show your consumers that you care about their security and convenience.]]></description><link>https://www.loginradius.com/blog/identity/enterprise-single-sign-on-authentication/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/enterprise-single-sign-on-authentication/</guid><category><![CDATA[sso authentication]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 18 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/541661119341ea2cdcf8c5db052441ad/7f8e9/sso-authentication.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Today, consumers want to log into one place and access all of their favorite sites and services using their preferred login credentials. Single sign-on is a great way to show your consumers that you care about their security and convenience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/enterprise-single-sign-on-authentication/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[8 Key Components of a Perfect CIAM Platform]]></title><description><![CDATA[More than just individuals, a perfect CIAM platform needs to be able to incorporate. There are plenty of business processes and activities loaded with identity, and the number of these is only set to increase in the future. Both native and third-party applications that manage customer data are linked by a well-designed customer identity solution.]]></description><link>https://www.loginradius.com/blog/identity/perfect-ciam-platform/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/perfect-ciam-platform/</guid><category><![CDATA[ciam platform]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 10 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0272b8b1dfe1f9e60bb86adedaa2f781/7f8e9/fetaure-image-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; More than just individuals, a perfect CIAM platform needs to be able to incorporate. There are plenty of business processes and activities loaded with identity, and the number of these is only set to increase in the future. Both native and third-party applications that manage customer data are linked by a well-designed customer identity solution. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/perfect-ciam-platform/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Customer Identity and Access Management(CIAM)?]]></title><description><![CDATA[The customer login experience is taken over by customer identity and access management (CIAM). There's more than just registration and authentication at stake. You're losing out on a host of advantages if all you get from your clients when they log in is an email address to send newsletters and passwords. We illustrate in this article how CIAM will help the organisation face the future head-on.]]></description><link>https://www.loginradius.com/blog/identity/customer-identity-and-access-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identity-and-access-management/</guid><category><![CDATA[ciam solution]]></category><category><![CDATA[compliance]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 03 Jun 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8bf2cfba916ab2b1d9aa90775e6803c/58556/ciam-cover.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The customer login experience is taken over by customer identity and access management (CIAM). There&apos;s more than just registration and authentication at stake. You&apos;re losing out on a host of advantages if all you get from your clients when they log in is an email address to send newsletters and passwords. We illustrate in this article how CIAM will help the organisation face the future head-on. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identity-and-access-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[A Bot Protection Overview]]></title><link>https://www.loginradius.com/blog/engineering/a-bot-protection-overview/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/a-bot-protection-overview/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Captcha]]></category><category><![CDATA[Spam]]></category><category><![CDATA[Secure]]></category><category><![CDATA[IP]]></category><dc:creator><![CDATA[Chris Yee]]></dc:creator><pubDate>Fri, 31 May 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1e9de1f0f49317e7c7f90de2abc6e308/58556/Productshot.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Bots are tools that are created to automate tedious processes and reduce work. For example, chatbots automate replies to users for customer support, and search bots are used to populate search results on a Google search. However, there are many bots that are crafted for the… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/a-bot-protection-overview/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Chris Yee&amp;size=100</authorImage></item><item><title><![CDATA[OAuth 1.0 VS OAuth 2.0]]></title><description><![CDATA[Learn about the differences between OAuth 1.0 and OAuth 2.0 and how OAuth 2.0 is superior to OAuth 1.0]]></description><link>https://www.loginradius.com/blog/engineering/what-is-the-difference-between-oauth1-and-oauth2/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-the-difference-between-oauth1-and-oauth2/</guid><category><![CDATA[Oauth]]></category><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Ti Zhang]]></dc:creator><pubDate>Fri, 31 May 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/510a2fd56b48862ff6adf67d59bf19dd/58556/pexels-photo-373543.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about the differences between OAuth 1.0 and OAuth 2.0 and how OAuth 2.0 is superior to OAuth 1.0 &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-the-difference-between-oauth1-and-oauth2/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ti Zhang&amp;size=100</authorImage></item><item><title><![CDATA[Azure AD as an Identity provider]]></title><link>https://www.loginradius.com/blog/engineering/azure-ad-as-an-identity-provider/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/azure-ad-as-an-identity-provider/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[AzureAD]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Thu, 30 May 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cfb639b3060cd188a04597240fb1e37d/a3e81/TN0lxUr0.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This blog post goes over how you can connect your SAAS/web application with the Azure AD world. Let’s take a look at how Azure AD works as an identity provider to provide your users with the ability to log in. e.g if anyone using Office 365, able to log on with their standard… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/azure-ad-as-an-identity-provider/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[What is Single Sign-On (SSO) and How it Works?]]></title><description><![CDATA[SSO is an essential feature of an Identity and Access Management (IAM) access control platform. User identity authentication is important when it comes to understanding which permissions a user will have. One example of controlling access that integrates user identity management solutions with SSO solutions is the LoginRadius Identity platform.]]></description><link>https://www.loginradius.com/blog/identity/what-is-single-sign-on/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/what-is-single-sign-on/</guid><category><![CDATA[sso]]></category><category><![CDATA[identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 30 May 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7b69d92f7dcab7cad3f91d7d834a96c1/7f8e9/what-is-sso.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; SSO is an essential feature of an Identity and Access Management (IAM) access control platform. User identity authentication is important when it comes to understanding which permissions a user will have. One example of controlling access that integrates user identity management solutions with SSO solutions is the LoginRadius Identity platform. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/what-is-single-sign-on/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>13</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[California's CCPA 2.0 Passed: Everything You Need to Know About the New CPRA]]></title><description><![CDATA[On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as Proposition 24) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens.]]></description><link>https://www.loginradius.com/blog/identity/ccpa-introduction/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ccpa-introduction/</guid><category><![CDATA[ccpa]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[compliance]]></category><category><![CDATA[customer trust]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 03 May 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2d8d860c37729881d6c3bc92017355be/c0524/ccpa-intro.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as Proposition 24) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ccpa-introduction/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[IAM vs. CIAM: Which Solution is Right For You?]]></title><description><![CDATA[In order to serve customers, conventional identity management is no longer enough. This truly ought to go without saying. After all, internal management systems were initially designed to handle employee identities, and consumer preferences are not generally matched with their preferences of a successful user experience.]]></description><link>https://www.loginradius.com/blog/identity/iam-vs-ciam/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/iam-vs-ciam/</guid><category><![CDATA[iam]]></category><category><![CDATA[ciam]]></category><category><![CDATA[identity management]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 21 Mar 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f909e78a8e943a991b586181c7eca5b0/7f8e9/IAM-vs-CIAM-V01.01-01-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In order to serve customers, conventional identity management is no longer enough. This truly ought to go without saying. After all, internal management systems were initially designed to handle employee identities, and consumer preferences are not generally matched with their preferences of a successful user experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/iam-vs-ciam/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Use JWT with OAuth]]></title><description><![CDATA[Learn how to use JWT with OAuth and when & why]]></description><link>https://www.loginradius.com/blog/engineering/using-jwt-with-oauth2-when-and-why/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/using-jwt-with-oauth2-when-and-why/</guid><category><![CDATA[JWT]]></category><category><![CDATA[Oauth]]></category><category><![CDATA[JSON Web Token]]></category><dc:creator><![CDATA[Ti Zhang]]></dc:creator><pubDate>Mon, 11 Mar 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6bb161407bb0fc97a9525faaae5de564/58556/photo-1454165804606-c3d57bc86b40.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to use JWT with OAuth and when &amp; why &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/using-jwt-with-oauth2-when-and-why/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Ti Zhang&amp;size=100</authorImage></item><item><title><![CDATA[Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform]]></title><description><![CDATA[The Gigya technology may not have changed (yet), but it has dramatically changed the business that provides it. Now is the moment to start searching for the best alternatives to Gigya.]]></description><link>https://www.loginradius.com/blog/identity/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 20 Feb 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9616a6646dab98d1ceeccc4de0811cbd/58556/STUPID-WPPPPPPP-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The Gigya technology may not have changed (yet), but it has dramatically changed the business that provides it. Now is the moment to start searching for the best alternatives to Gigya. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Presenting: Progressive Profiling from LoginRadius]]></title><description><![CDATA[A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way.]]></description><link>https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/</guid><category><![CDATA[progressive profiling]]></category><category><![CDATA[cx]]></category><category><![CDATA[ciam solution]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 07 Feb 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1fea94bbaeb84867fae419f90d7bbfa/7f8e9/progrssive-profiling.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Best Practices for Choosing Good Security Questions]]></title><description><![CDATA[Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.]]></description><link>https://www.loginradius.com/blog/identity/best-practices-choosing-good-security-questions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/best-practices-choosing-good-security-questions/</guid><category><![CDATA[data security]]></category><category><![CDATA[password management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 31 Jan 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a5bab7f381343fca3327beeab8ac5eb0/7f8e9/security-questions.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/best-practices-choosing-good-security-questions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Let's Encrypt with SSL Certificates]]></title><link>https://www.loginradius.com/blog/engineering/lets-encrypt-with-ssl-certificates/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/lets-encrypt-with-ssl-certificates/</guid><category><![CDATA[SSL]]></category><category><![CDATA[SSL Certificate]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Ruben Gonzalez]]></dc:creator><pubDate>Mon, 14 Jan 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/90a313f3cd5904bc72263dd554515b3a/e9589/ssl.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What is an SSL Certificate? Let’s start with some working definitions of the HTTP and HTTPS protocols. HTTP is the Internet protocol over which data is sent between a browser and a server when they are communicating. HTTPS is the secure counterpart of HTTP , which encrypts data… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/lets-encrypt-with-ssl-certificates/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/rubenprograms.png?size=100v=40</authorImage></item><item><title><![CDATA[How Do I Know If My Email Has Been Leaked in a Data Breach?]]></title><description><![CDATA[To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.]]></description><link>https://www.loginradius.com/blog/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/</guid><category><![CDATA[data security]]></category><category><![CDATA[password management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 10 Jan 2019 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/839f9883679c43c535a5a5c6dfdd1e69/7f8e9/email-breach.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Encryption and Hashing]]></title><link>https://www.loginradius.com/blog/engineering/encryption-and-hashing/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/encryption-and-hashing/</guid><category><![CDATA[Encryption]]></category><category><![CDATA[Hashing]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Mon, 24 Dec 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c6f801b062415da8d1e6bf77b081d5a2/0407f/encryption-and-hashing.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Both encryption and hashing have significant uses in cryptology and other fields. One defining difference between them is that encryption is reversible, while hashing is irreversible. Because of this, encryption is often used for protecting the confidentiality of data. Only… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/encryption-and-hashing/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[The Death of Passwords [Infographic]]]></title><description><![CDATA[Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.]]></description><link>https://www.loginradius.com/blog/identity/infographic-the-death-of-passwords/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/infographic-the-death-of-passwords/</guid><category><![CDATA[passwordless authentication]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[mfa]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 19 Dec 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d6212ca7d6363d9be407c8985a16cc20/7f8e9/death-of-passwords.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/infographic-the-death-of-passwords/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access]]></title><description><![CDATA[To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up!]]></description><link>https://www.loginradius.com/blog/identity/use-multi-factor-authentication-dont-cell-phone-access/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/use-multi-factor-authentication-dont-cell-phone-access/</guid><category><![CDATA[mfa]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 19 Dec 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d158862a4e4a3d4f37ffe23defcfcdae/7f8e9/use-mfa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up! &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/use-multi-factor-authentication-dont-cell-phone-access/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Customer Identity Infrastructure that Cruise Line Passengers Don’t See]]></title><description><![CDATA[In building enormous ships and fun activities to do on them, cruise lines are well-known for their creativity. Some of the major players, both interactive and onboard, are also doing fascinating stuff around customer service.]]></description><link>https://www.loginradius.com/blog/identity/customer-identity-infrastructure-cruise-line-passengers-dont-see/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identity-infrastructure-cruise-line-passengers-dont-see/</guid><category><![CDATA[travel-and-hospitality]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 11 Dec 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3eec4a32fbdf74d6edb1dc399c4f1750/58556/peter-hansen-455710-unsplash-2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In building enormous ships and fun activities to do on them, cruise lines are well-known for their creativity. Some of the major players, both interactive and onboard, are also doing fascinating stuff around customer service. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identity-infrastructure-cruise-line-passengers-dont-see/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Why Your Enterprise Needs a Digital Business Transformation Strategy]]></title><description><![CDATA[Companies will need to build innovative digital experiences and exclusive online services by 2020 just to remain competitive, let alone to get ahead. Top businesses in the media, telecommunications, and financial sectors are under pressure to grow market share and provide their consumers with more value.]]></description><link>https://www.loginradius.com/blog/identity/enterprise-needs-digital-business-transformation-strategy/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/enterprise-needs-digital-business-transformation-strategy/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 26 Nov 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7eae9b404386c06cac437942ea2770ec/58556/rawpixel-579231-unsplash-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Companies will need to build innovative digital experiences and exclusive online services by 2020 just to remain competitive, let alone to get ahead. Top businesses in the media, telecommunications, and financial sectors are under pressure to grow market share and provide their consumers with more value. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/enterprise-needs-digital-business-transformation-strategy/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Reconsidering Social Login from a Security and Privacy Angle]]></title><description><![CDATA[Login strategies can come and go, but the identity of the customer is here to stay. In the wake of two major exposures of data on Facebook and Google+ exacerbated by social login, the repercussions for B2C companies can be addressed. Are social login privacy and security threats still worth the convenience? And what steps do businesses take to safeguard consumer data and preserve public confidence? Let 's begin with a bit of history.]]></description><link>https://www.loginradius.com/blog/identity/reconsidering-social-login-security-privacy-angle/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/reconsidering-social-login-security-privacy-angle/</guid><category><![CDATA[social login]]></category><category><![CDATA[data security]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 20 Nov 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/35f42b4579bddf0c3b2555a68885211c/58556/reconsidering-social-login.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Login strategies can come and go, but the identity of the customer is here to stay. In the wake of two major exposures of data on Facebook and Google+ exacerbated by social login, the repercussions for B2C companies can be addressed. Are social login privacy and security threats still worth the convenience? And what steps do businesses take to safeguard consumer data and preserve public confidence? Let &apos;s begin with a bit of history. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/reconsidering-social-login-security-privacy-angle/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[  Improving Fan Experience in the Sports Industry]]></title><description><![CDATA[In the crown-hit world of sports, it is an extraordinary moment. Digital transformation is helping them give their fans new and easier ways to connect with their team as teams prepare for a new age of fan engagement in the sports industry.]]></description><link>https://www.loginradius.com/blog/growth/improving-customer-fan-experience-sports-entertainment-industry/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/improving-customer-fan-experience-sports-entertainment-industry/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 15 Nov 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4518a16d9c6656a0fa8731b603f60345/58556/Fan-experience-in-sports-industry.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the crown-hit world of sports, it is an extraordinary moment. Digital transformation is helping them give their fans new and easier ways to connect with their team as teams prepare for a new age of fan engagement in the sports industry. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/improving-customer-fan-experience-sports-entertainment-industry/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Improving Customer Experience in the Public Sector]]></title><description><![CDATA[When people think of the experience of online users, they will not consider it relevant in the public sector. LoginRadius is currently helping a variety of public sector organisations enhance their customer service in various ways.]]></description><link>https://www.loginradius.com/blog/identity/improving-customer-experience-public-sector/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/improving-customer-experience-public-sector/</guid><category><![CDATA[data security]]></category><category><![CDATA[ciam solutions]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 26 Oct 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3b5a47b718d77a6fd2db039099ba1554/7f8e9/customer-experience.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When people think of the experience of online users, they will not consider it relevant in the public sector. LoginRadius is currently helping a variety of public sector organisations enhance their customer service in various ways. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/improving-customer-experience-public-sector/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Customer Spotlight - Hydro Ottawa]]></title><description><![CDATA[In the Canadian power sector, Hydro Ottawa, the largest local electricity distribution company in eastern Ontario, is also a leader. It is the first utility provider in Canada to provide both Amazon Alexa and Google Home with voice assistant skills. Hydro Ottawa has totally disrupted the Canadian utility industry for the better by concentrating on the needs of their clients.]]></description><link>https://www.loginradius.com/blog/identity/customer-spotlight-hydro-ottawa/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-spotlight-hydro-ottawa/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 16 Oct 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/764ca3be101bb8bcd501e8fd49f7ab22/58556/customer-spotlight-hydro-ottawa.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In the Canadian power sector, Hydro Ottawa, the largest local electricity distribution company in eastern Ontario, is also a leader. It is the first utility provider in Canada to provide both Amazon Alexa and Google Home with voice assistant skills. Hydro Ottawa has totally disrupted the Canadian utility industry for the better by concentrating on the needs of their clients. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-spotlight-hydro-ottawa/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Digital Transformation: Safeguarding the Customer Experience]]></title><description><![CDATA[Superior customer service is one of the key factors for company success in today's digitally linked world. Personalization, which harnesses the power of digital transformation in order to create curated interactions that can fuel customer engagement and market differentiation, is at the core of the experience.]]></description><link>https://www.loginradius.com/blog/identity/digital-transformation-safeguarding-customer-experience/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/digital-transformation-safeguarding-customer-experience/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[customer identity management]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Wed, 03 Oct 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f8c805060a1d86103f0f16bf8295cde3/58556/digital-transformation-safeguarding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Superior customer service is one of the key factors for company success in today&apos;s digitally linked world. Personalization, which harnesses the power of digital transformation in order to create curated interactions that can fuel customer engagement and market differentiation, is at the core of the experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/digital-transformation-safeguarding-customer-experience/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Rede Gazeta, a LoginRadius Customer Success Story]]></title><description><![CDATA[By implementing LoginRadius, Rede Gazeta now have an even better understanding of what their readers are interested in, and can devote their time into generating quality content that their users want to read.]]></description><link>https://www.loginradius.com/blog/identity/rede-gazeta-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/rede-gazeta-loginradius-customer-success-story/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Thu, 06 Sep 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7ee981b07948cc9f29e88d5b4ad83f6a/58556/lr-and-rede-gazeta.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; By implementing LoginRadius, Rede Gazeta now have an even better understanding of what their readers are interested in, and can devote their time into generating quality content that their users want to read. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/rede-gazeta-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[4 Things to Consider When Starting a Digital Transformation]]></title><description><![CDATA[Everywhere you look, businesses are revealing plans to undergo digital business transformations. The problem they are facing, though is deciding where to start.]]></description><link>https://www.loginradius.com/blog/growth/4-things-consider-starting-digital-transformation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/4-things-consider-starting-digital-transformation/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 09 Aug 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4a1081cf267e11e5e806e5ac92dc1aef/58556/4-things-consider-starting-digital-transformation.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Everywhere you look, businesses are revealing plans to undergo digital business transformations. The problem they are facing, though is deciding where to start. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/4-things-consider-starting-digital-transformation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[4 Barriers to Building a Digital Business and How to Overcome Them]]></title><description><![CDATA[The world is becoming increasingly digital because consumers demand faster service and convenience from their business transactions. This shift toward digitalization requires businesses to change the way they operate. Learn about the major barriers that traditional companies face in the online space and how to overcome them.]]></description><link>https://www.loginradius.com/blog/identity/4-barriers-building-digital-business-overcome/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/4-barriers-building-digital-business-overcome/</guid><category><![CDATA[customer-experience]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 02 Aug 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0e21e3ce8df513d5ba242b6dc61f0c07/58556/4-barriers-building-digital-business-overcome.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The world is becoming increasingly digital because consumers demand faster service and convenience from their business transactions. This shift toward digitalization requires businesses to change the way they operate. Learn about the major barriers that traditional companies face in the online space and how to overcome them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/4-barriers-building-digital-business-overcome/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[LoginRadius Announces $17M Series A Funding from ForgePoint and Microsoft]]></title><description><![CDATA[LoginRadius, led by ForgePoint Capital and Microsoft's venture fund, M12, has raised $17 million in Series A funding. Both businesses will also join our board in conjunction with the funding to further our collaboration, product and innovation cycles.]]></description><link>https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/</guid><category><![CDATA[industry-news]]></category><category><![CDATA[other]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 24 Jul 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fdb8610707cb15170f7eb2bbee9fe5be/58556/loginradius-announces-17m-series-funding.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LoginRadius, led by ForgePoint Capital and Microsoft&apos;s venture fund, M12, has raised $17 million in Series A funding. Both businesses will also join our board in conjunction with the funding to further our collaboration, product and innovation cycles. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[What is JSON Web Token]]></title><link>https://www.loginradius.com/blog/engineering/jwt/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/jwt/</guid><category><![CDATA[JWT]]></category><category><![CDATA[JSON Web Token]]></category><dc:creator><![CDATA[Mayank Agarwal]]></dc:creator><pubDate>Wed, 11 Jul 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fca016963236696b6d07a52d211c1354/58556/jwt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A JSON Web Token (JWT) is a JSON object that is defined in RFC 7519 as a safe way of transmitting information between two parties. Information in the JWT is digitally-signed, so that it can be verified and trusted. JWT Properties Less verbose -  JWT is compact in size and can be… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/jwt/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/mayankagrwal.png?size=100v=40</authorImage></item><item><title><![CDATA[BroadcastMed, a LoginRadius Customer Success Story]]></title><description><![CDATA[BroadcastMed has been innovating digital strategies for healthcare providers and organizations. How loginradius assist them in managing user identities.]]></description><link>https://www.loginradius.com/blog/identity/broadcastmed-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/broadcastmed-loginradius-customer-success-story/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Thu, 05 Jul 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/15e3271f09c6fce827bea18b5c1cf6a0/58556/LR-and-BroadcastMed.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; BroadcastMed has been innovating digital strategies for healthcare providers and organizations. How loginradius assist them in managing user identities. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/broadcastmed-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Understanding JSONP]]></title><link>https://www.loginradius.com/blog/engineering/understanding-jsonp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/understanding-jsonp/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[JSONP]]></category><category><![CDATA[API]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 29 Jun 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/85e9390b35cfcd06b4e455bd05cc8ea7/50fff/Screenshot-2018-06-29-12.21.27.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Nowadays, many API providers support JSONP requests. One reason for this is that most web browsers disable cross-domain requests when using basic Ajax. For example, if your website has the domain &quot;a.com&quot;, it will use JavaScript hosted on a.com. When the a.com JavaScript makes an… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/understanding-jsonp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Using NuGet to publish .NET packages]]></title><link>https://www.loginradius.com/blog/engineering/using-nuget-to-publish-net-packages/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/using-nuget-to-publish-net-packages/</guid><category><![CDATA[NuGet]]></category><category><![CDATA[.NET]]></category><dc:creator><![CDATA[Hitesh Pamnani]]></dc:creator><pubDate>Thu, 28 Jun 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b965f64c315a9fddcd7037c0d1e1441f/ad85c/desdev.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; NuGet is a free and open-source package manager for the .NET ecosystem. We can create and install packages using NuGet client tools. All of the .NET packages are hosted for publishing and consumption on a central package repository known as NuGet Gallery. Prerequisites Visual… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/using-nuget-to-publish-net-packages/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hitesh Pamnani&amp;size=100</authorImage></item><item><title><![CDATA[How to configure the 'Actions on Google' console for Google Assistant]]></title><link>https://www.loginradius.com/blog/engineering/how-to-configure-the-actions-on-google-console-for-google-assistant/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-configure-the-actions-on-google-console-for-google-assistant/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[GoogleAssistant]]></category><dc:creator><![CDATA[Vincent Lin]]></dc:creator><pubDate>Mon, 18 Jun 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8744b7a7d1a64b8263651675a3ff555f/58556/google-home-max-13.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Time Required : less than 10 minutes. Technologies : None. Prerequisites : None. This tutorial will go over how to configure the ‘Actions on Google’ console so that it can be used for your Google Assistant actions/events that can be accessed anywhere the Google Assistant is… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-configure-the-actions-on-google-console-for-google-assistant/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Vincent Lin&amp;size=100</authorImage></item><item><title><![CDATA[Why Municipalities Are Investing in Citizen Engagement]]></title><description><![CDATA[Municipalities can achieve many benefits by investing in a well-designed and implemented citizen-centered approach, while enhancing the quality of life for people is at the core of many digital municipal initiatives.]]></description><link>https://www.loginradius.com/blog/identity/municipals-investing-citizen-engagement/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/municipals-investing-citizen-engagement/</guid><category><![CDATA[public-sector]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 18 Jun 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/211730b2addbb6996b0be156bf8569a8/58556/collaboration-colleagues-community-398532-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Municipalities can achieve many benefits by investing in a well-designed and implemented citizen-centered approach, while enhancing the quality of life for people is at the core of many digital municipal initiatives. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/municipals-investing-citizen-engagement/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Creating a Google Hangout Bot with Express and Node.js]]></title><link>https://www.loginradius.com/blog/engineering/creating-a-google-hangout-bot-with-express-and-node-js/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/creating-a-google-hangout-bot-with-express-and-node-js/</guid><category><![CDATA[Express]]></category><category><![CDATA[NodeJs]]></category><category><![CDATA[Hangout]]></category><dc:creator><![CDATA[Andy Yeung]]></dc:creator><pubDate>Wed, 06 Jun 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ce69f8b38834ee73f9b8821830d73c87/0c543/hangoutchatimgage2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Time Required: 20 minutes. Technologies: Express, Node.js, JavaScript. Prerequisites: Basic knowledge of Express, Node.js, and JavaScript. Node.js and npm are installed. This tutorial will go over how to build a bot that will respond to pings (i.e. @), and send messages to a chat… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/creating-a-google-hangout-bot-with-express-and-node-js/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Andy Yeung&amp;size=100</authorImage></item><item><title><![CDATA[Customer Experience is Driving Digital Transformation]]></title><description><![CDATA[Customers today demand meaningful content which is based on their preferences and behaviours. Companies have to accept these digital transformations to offer this connected customer experience.]]></description><link>https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/</guid><category><![CDATA[digital transformation]]></category><category><![CDATA[modern customer identity]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 18 May 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/84e66a7092c551e51cccffe08587e9ec/58556/linkedin-sales-navigator-402831-unsplash1-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Customers today demand meaningful content which is based on their preferences and behaviours. Companies have to accept these digital transformations to offer this connected customer experience. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Identity Fraud Hits All-Time High in 2017]]></title><description><![CDATA[The rate of identity theft increased in 2017, amid years of fighting and a major shift in the way American debit and credit cards are used.]]></description><link>https://www.loginradius.com/blog/identity/identity-fraud-hits-time-high-2017/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/identity-fraud-hits-time-high-2017/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 20 Feb 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/93f4c3fc5b036df35768105049932835/c0524/identity-fraud-hits-time-high-2017.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The rate of identity theft increased in 2017, amid years of fighting and a major shift in the way American debit and credit cards are used. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/identity-fraud-hits-time-high-2017/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Phishing Attacks: How to Identify & Avoid Phishing Scams]]></title><description><![CDATA[A Phishing attack can be a death blow for businesses that don't take the necessary precautions. Not only is the top-line affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public. We have hashed out some of the most common types of phishing attacks and how to prevent them.]]></description><link>https://www.loginradius.com/blog/identity/phishing-for-identity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/phishing-for-identity/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 13 Feb 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0b5af21d98ca1473388727296258a296/176df/phishing-for-identity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; A Phishing attack can be a death blow for businesses that don&apos;t take the necessary precautions. Not only is the top-line affected, but the brand&apos;s image and trust can be obliterated if news of a data breach reaches the public. We have hashed out some of the most common types of phishing attacks and how to prevent them. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/phishing-for-identity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[IFMA, a LoginRadius Customer Success Story]]></title><description><![CDATA[The International Facility Management Association (IFMA) is the largest global association and advisory body for professionals in facility management in the world. IFMA was established in 1980 and offers credentialing, education services, and guidance to professionals in facility management.]]></description><link>https://www.loginradius.com/blog/identity/ifma-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/ifma-loginradius-customer-success-story/</guid><category><![CDATA[other]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Mon, 15 Jan 2018 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f9d85c5c91a2b4bd12993531023a8385/6e368/ifma-loginradius-customer-success-story.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The International Facility Management Association (IFMA) is the largest global association and advisory body for professionals in facility management in the world. IFMA was established in 1980 and offers credentialing, education services, and guidance to professionals in facility management. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/ifma-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Canada To Fine Companies For Not Reporting Data Breaches]]></title><description><![CDATA[The news of Canada to fine companies for not reporting data breaches is making headlines these days. Know what it means for your business.]]></description><link>https://www.loginradius.com/blog/identity/canada-to-fine-companies-for-not-reporting-data-breaches/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/canada-to-fine-companies-for-not-reporting-data-breaches/</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Thu, 07 Sep 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a113ed05331270297227d6c83896ea43/47203/canada-to-fine-companies.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The news of Canada to fine companies for not reporting data breaches is making headlines these days. Know what it means for your business. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/canada-to-fine-companies-for-not-reporting-data-breaches/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[EOL or End of Line or newline ascii character]]></title><description><![CDATA[Learn what are EOL (End of Line) or LF (Line Feed) or NL (New Line) ascii characters (\n\r) and why there are two (\n\r) newline characters.]]></description><link>https://www.loginradius.com/blog/engineering/eol-end-of-line-or-newline-characters/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/eol-end-of-line-or-newline-characters/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[EOL]]></category><category><![CDATA[LF]]></category><category><![CDATA[Linux]]></category><category><![CDATA[Mac]]></category><category><![CDATA[Windows]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Wed, 06 Sep 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c54e66c499f461eea5df725fac0348d7/58556/eol.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn what are EOL (End of Line) or LF (Line Feed) or NL (New Line) ascii characters (\n\r) and why there are two (\n\r) newline characters. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/eol-end-of-line-or-newline-characters/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Cocoapods : What It Is And How To Install?]]></title><link>https://www.loginradius.com/blog/engineering/what-is-cocoapods-and-installation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-cocoapods-and-installation/</guid><category><![CDATA[Swift]]></category><category><![CDATA[Objective-C]]></category><category><![CDATA[xcode]]></category><dc:creator><![CDATA[Thompson Sanjoto]]></dc:creator><pubDate>Wed, 06 Sep 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/44cf00aba943bff992ac72c888078a70/58556/cocoapods-orange-on-grey.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Cocoapod is a package dependency manager for Objective-C and Swift projects with XCode. Those Languages are used to make applications that run iOS, macOS, watchOS and tvOS. Cocoapods also acts as a coding hub to share your code with other people. That way we as a community of… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-cocoapods-and-installation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Thompson Sanjoto&amp;size=100</authorImage></item><item><title><![CDATA[Node Package Manager (NPM)]]></title><link>https://www.loginradius.com/blog/engineering/node-package-manager-npm/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/node-package-manager-npm/</guid><category><![CDATA[NodeJs]]></category><category><![CDATA[NPM]]></category><dc:creator><![CDATA[Eric Chan]]></dc:creator><pubDate>Fri, 04 Aug 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4caf8328a2c92711c224c09a0b6c405f/58556/the-guide-to-NPM.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; the guide to NPMWhat is This, and Why Should I Care? NPM is a package manager for javascript. It is used to share and distribute code amongst the coding community. There are over half a million packages for free developed and shared to help your JavaScript development. To… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/node-package-manager-npm/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Eric Chan&amp;size=100</authorImage></item><item><title><![CDATA[Test Cases For Your E-commerce Payment Gateway Page]]></title><description><![CDATA[Trying to make test cases to build a flawless payment gateway page for your ecommerce website? Here are some factors you need to take seriously before creating test cases for payment gateway page.]]></description><link>https://www.loginradius.com/blog/growth/test-cases-for-your-e-commerce-payment-gateway-page/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/test-cases-for-your-e-commerce-payment-gateway-page/</guid><category><![CDATA[payment gateway]]></category><category><![CDATA[technology]]></category><category><![CDATA[ecommerce]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 21 Jul 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6ac116c00356e121023bdc61acd4f965/5239a/Test-Cases-for-your-Ecommerce-Payment-Gateway-Page.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Trying to make test cases to build a flawless payment gateway page for your ecommerce website? Here are some factors you need to take seriously before creating test cases for payment gateway page. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/test-cases-for-your-e-commerce-payment-gateway-page/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Get your FREE SSL Certificate!]]></title><link>https://www.loginradius.com/blog/engineering/get-your-free-ssl-certificate/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/get-your-free-ssl-certificate/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[SSL]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 13 Jul 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9dac90102c33db64e0dc88c91e3138a2/a3e81/letsencrypt.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; These days SSL is a must-have element for websites, but SSL certificates are costly and range from $30 to $500 per year for a single website. Don’t fret! You can get a FREE SSL certificate! Through “Let&apos;s Encrypt&quot;, a free, automated, and open certificate authority, you will be… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/get-your-free-ssl-certificate/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[jCenter Dependencies in Android Studio]]></title><description><![CDATA[Learn how to make use of jCenter dependencies in Android Studio.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-use-jcenter-dependencies-in-android-studio/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-use-jcenter-dependencies-in-android-studio/</guid><category><![CDATA[JCenter]]></category><category><![CDATA[Android]]></category><dc:creator><![CDATA[Hitesh Pamnani]]></dc:creator><pubDate>Tue, 11 Jul 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a9a8e082bff7f37ce001b37deba19d8c/58556/jCenter.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to make use of jCenter dependencies in Android Studio. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-use-jcenter-dependencies-in-android-studio/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Hitesh Pamnani&amp;size=100</authorImage></item><item><title><![CDATA[Maven Dependency in Eclipse]]></title><description><![CDATA[Learn step by step setting up and resolution of maven dependency using eclipse IDE.]]></description><link>https://www.loginradius.com/blog/engineering/how-to-use-maven-dependency-in-eclipse/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-use-maven-dependency-in-eclipse/</guid><category><![CDATA[Java]]></category><category><![CDATA[Maven]]></category><category><![CDATA[Eclipse]]></category><dc:creator><![CDATA[Giriraj Yadav]]></dc:creator><pubDate>Tue, 11 Jul 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6df6019580145a8674f864bc824a80fc/58556/maven.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn step by step setting up and resolution of maven dependency using eclipse IDE. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-use-maven-dependency-in-eclipse/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Giriraj Yadav&amp;size=100</authorImage></item><item><title><![CDATA[Install Bootstrap with Bower]]></title><description><![CDATA[Learn how the Bower package manager helps into quick components  deploy and install Bootstrap using Bower]]></description><link>https://www.loginradius.com/blog/engineering/how-to-use-bower-to-install-bootstrap/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-use-bower-to-install-bootstrap/</guid><category><![CDATA[Bootstrap]]></category><category><![CDATA[Bower]]></category><dc:creator><![CDATA[Pascal Noel]]></dc:creator><pubDate>Wed, 05 Jul 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d319266a1157fbb5549a7b376455d29a/58556/bower-logo.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how the Bower package manager helps into quick components  deploy and install Bootstrap using Bower &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-use-bower-to-install-bootstrap/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Pascal Noel&amp;size=100</authorImage></item><item><title><![CDATA[Mapegy, a LoginRadius Customer Success Story]]></title><description><![CDATA[Mapegy was reassured from the get-go with a versatile and adjustable platform, alongside a guaranteed 99.99 percent uptime, that our solution is indeed both reliable and scalable when adapting to their needs and user base as they expand. Our login and registration flows have helped Mapegy to provide a simplified and hassle-free login and registration process for their users while building centralised user profiles with the extended data points that Mapegy was searching for.]]></description><link>https://www.loginradius.com/blog/identity/mapegy-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/mapegy-loginradius-customer-success-story/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Thu, 15 Jun 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/24318811f184da31876379297f3365df/58556/Mapegy_LR.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Mapegy was reassured from the get-go with a versatile and adjustable platform, alongside a guaranteed 99.99 percent uptime, that our solution is indeed both reliable and scalable when adapting to their needs and user base as they expand. Our login and registration flows have helped Mapegy to provide a simplified and hassle-free login and registration process for their users while building centralised user profiles with the extended data points that Mapegy was searching for. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/mapegy-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Aurora WDC, a LoginRadius Customer Success Story]]></title><description><![CDATA[Aurora WDC is a leading analytics and intelligence company that has been able, with the aid of LoginRadius, to provide its members with an improved user experience and to better manage their customer relationships.]]></description><link>https://www.loginradius.com/blog/identity/aurora-wdc-loginradius-customer-success-story/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/aurora-wdc-loginradius-customer-success-story/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Fri, 26 May 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/870c51947a23ce9e8ef5bbddf29e0d94/58556/aurora-wdc-loginradius-customer-success-story.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Aurora WDC is a leading analytics and intelligence company that has been able, with the aid of LoginRadius, to provide its members with an improved user experience and to better manage their customer relationships. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/aurora-wdc-loginradius-customer-success-story/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[A Complete Color Scheme Guide For Your Website]]></title><description><![CDATA[Don't Know Which Colors will suit your Website? Here's the Complete Guide about Color Scheme that will help you choose the best color palette for your Site.]]></description><link>https://www.loginradius.com/blog/growth/complete-color-scheme-guide-for-your-website/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/complete-color-scheme-guide-for-your-website/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 19 May 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ec74cefbbdd2d4daf4cc8d9ea25ab3c7/58556/A-Complete-Color-Scheme-Guide-For-Your-Website.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Don&apos;t Know Which Colors will suit your Website? Here&apos;s the Complete Guide about Color Scheme that will help you choose the best color palette for your Site. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/complete-color-scheme-guide-for-your-website/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>9</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Spice Up Your Resume: Create a Visual One]]></title><description><![CDATA[This year, ditch your regular resume! Spice up your resume by creating a visual one. Read on the article to find out how.]]></description><link>https://www.loginradius.com/blog/growth/spice-up-your-resume-create-visual-one/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/spice-up-your-resume-create-visual-one/</guid><dc:creator><![CDATA[Navanita Devi]]></dc:creator><pubDate>Mon, 15 May 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3dd337d588255ddddef285de992aed6d/58556/Spice-up-your-resume-Create-a-virtual-one.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This year, ditch your regular resume! Spice up your resume by creating a visual one. Read on the article to find out how. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/spice-up-your-resume-create-visual-one/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Navanita Devi&amp;size=100</authorImage></item><item><title><![CDATA[The Ultimate Guide to Craft Sign-up Forms That Convert Like Crazy]]></title><description><![CDATA[Do your signup forms contribute in your lead generation campaign? Craft your signup forms with these best practices to make sure they convert like crazy.]]></description><link>https://www.loginradius.com/blog/growth/sign-up-forms-best-practices/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/sign-up-forms-best-practices/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 28 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2c2f497fead0412a8c8fbca6c8a6037d/5239a/The-ultimate-guide-to-craft-sign-up-forms-that-covert-like-crazy.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Do your signup forms contribute in your lead generation campaign? Craft your signup forms with these best practices to make sure they convert like crazy. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/sign-up-forms-best-practices/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Open Source Business Email Validator By Loginradius]]></title><link>https://www.loginradius.com/blog/engineering/open-source-business-email-validator-by-loginradius/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/open-source-business-email-validator-by-loginradius/</guid><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 25 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a657ff09e846d7d100b0fae0ea7714e9/fa668/Open-Source-Business-Validator-By-Loginradius.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; While creating Lead Generation form at LoginRadius, Marketers wanted to sure that visitors enter business emails. To that end, I created a list in JSON format to block free mail providers like Gmail, Outlook etc. Business mail validator makes sure users enters only business… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/open-source-business-email-validator-by-loginradius/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Know The Types of Website Popups and How to Create Them]]></title><link>https://www.loginradius.com/blog/engineering/the-ultimate-guide-to-website-pop-ups/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/the-ultimate-guide-to-website-pop-ups/</guid><category><![CDATA[CSS]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Thu, 20 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d404c01e7d4da26cf8ec6404c910921c/5239a/The-Ultimate-guide-to-website-pop-ups.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; POPUPS! They can annoy you but if used properly, they can be a boon to any marketing campaign. In 2015, Taylor wrote an article on best practices to use popup. While the article discussed how to optimize popup, in this article I am going to list down the types of articles and how… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/the-ultimate-guide-to-website-pop-ups/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Javascript tips and tricks to Optimize Performance]]></title><description><![CDATA[Learn how to optimize performance using some useful javascript hacks, tips and tricks.]]></description><link>https://www.loginradius.com/blog/engineering/16-javascript-hacks-for-optimization/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/16-javascript-hacks-for-optimization/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[JavaScript]]></category><category><![CDATA[Hacks]]></category><category><![CDATA[Array]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Fri, 07 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0d6472e55ba0b111b3dfa895ec2dec57/7f8e9/16-JavaScript-Hacks-to-save-time-and-boost-productivity-768x555.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to optimize performance using some useful javascript hacks, tips and tricks. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/16-javascript-hacks-for-optimization/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[10 Smart Tips to Make You More Resilient At Office]]></title><description><![CDATA[Stop being so delicate at your failures. Rise like a Phoenix at work by working out these wonderful habits practiced by resilient people.]]></description><link>https://www.loginradius.com/blog/growth/10-smart-tips-to-make-you-more-resilient-at-office/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/10-smart-tips-to-make-you-more-resilient-at-office/</guid><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 07 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3684582a5f31c4b889d19e00cc0b7c05/5239a/10-Smart-Tips-to-Make-You-More-Resilient-At-Office.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Stop being so delicate at your failures. Rise like a Phoenix at work by working out these wonderful habits practiced by resilient people. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/10-smart-tips-to-make-you-more-resilient-at-office/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Fight Mediocrity at Your Workplace, Dare to be Awesome!]]></title><description><![CDATA[Tired of Being Mediocre At Work? These 10 Awesome Habits can take you out of your Comfort Zone and help you Live the life you want.]]></description><link>https://www.loginradius.com/blog/growth/fight-mediocrity-at-your-workplace/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/fight-mediocrity-at-your-workplace/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 07 Apr 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/440114de42fba0be8ddaa8311d3f293f/58556/Fight-mediocrity-at-your-workplace-dare-to-be-awesome.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Tired of Being Mediocre At Work? These 10 Awesome Habits can take you out of your Comfort Zone and help you Live the life you want. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/fight-mediocrity-at-your-workplace/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Insert Keep Notes in Doc Plus other Keep Tips For Better Productivity]]></title><description><![CDATA[With the recent update by Google to integrate Keep with G Suite, Keep has become our all time bestie. Google Keep Tips you always wanted to know for better productivity.]]></description><link>https://www.loginradius.com/blog/growth/google-keep-tips-for-productivity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/google-keep-tips-for-productivity/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 06 Mar 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9b38cdd91771a5964ee8a300af2a5b26/58556/How-To-Insert-Keep-notes-in-Doc-Plus-other-Keep-tips-For-Better-Productivity.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With the recent update by Google to integrate Keep with G Suite, Keep has become our all time bestie. Google Keep Tips you always wanted to know for better productivity. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/google-keep-tips-for-productivity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[IOM X, a LoginRadius Customer Success Story]]></title><description><![CDATA[We take a break from tip-giving. Here's a real-life instance of LoginRadius in motion, collaborating with IOM X to solve the numerous problems and optimise their marketing metrics.]]></description><link>https://www.loginradius.com/blog/identity/customer-success-story-iom-x/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-success-story-iom-x/</guid><category><![CDATA[media-and-publication]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Wed, 01 Mar 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bd1eab2798558ec05d436c5a6ca268f0/58556/customer-success-story-iom-x.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; We take a break from tip-giving. Here&apos;s a real-life instance of LoginRadius in motion, collaborating with IOM X to solve the numerous problems and optimise their marketing metrics. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-success-story-iom-x/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[11 Slack App Integrations to Boost Productivity at Your Workplace]]></title><description><![CDATA[Take productivity to a new level with Slack integrations. Check out the best Slack app integrations available for you.]]></description><link>https://www.loginradius.com/blog/growth/slack-integrations-for-productivity/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/slack-integrations-for-productivity/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 28 Feb 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dc2054b02d78a65ce74e201bcc900169/5239a/Untitled-design-6.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Take productivity to a new level with Slack integrations. Check out the best Slack app integrations available for you. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/slack-integrations-for-productivity/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Don’t Waste Time! Facts to learn to write the Best Professional Bio]]></title><description><![CDATA[Fed up pulling your hairs to craft an engaging professional bio? Here are quick tips to writing ideal professional bio along with some real life examples.]]></description><link>https://www.loginradius.com/blog/growth/how-to-write-professional-bio-with-examples/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-write-professional-bio-with-examples/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 27 Feb 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/98c2bf2c9fc509e43f9233dd794ac047/58556/Quick-tips-to-learn-to-write-the-Best-Professional-Bio.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Fed up pulling your hairs to craft an engaging professional bio? Here are quick tips to writing ideal professional bio along with some real life examples. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-write-professional-bio-with-examples/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[16 Best Writing Tools and Software For A Creative Blogger [ Free tools Inside]]]></title><description><![CDATA[Got stuck in the middle of an article or struggling for an interesting topic? Here are some awesome writer tools which can help.]]></description><link>https://www.loginradius.com/blog/growth/best-writing-tools-software-for-a-creative-blogger/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/best-writing-tools-software-for-a-creative-blogger/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 17 Feb 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/43db365a50271bcf43489e51eaf88482/58556/Pro-Tip-2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Got stuck in the middle of an article or struggling for an interesting topic? Here are some awesome writer tools which can help. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/best-writing-tools-software-for-a-creative-blogger/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[How To Be A Pro At Slack In 6 Simple Steps]]></title><description><![CDATA[Are you still struggling with Slack at your workplace? Try out these six slack tips along with additional features to become a pro at Slack and let us know some of your own! ]]></description><link>https://www.loginradius.com/blog/growth/how-to-be-a-pro-at-slack-in-6-simple-steps/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/how-to-be-a-pro-at-slack-in-6-simple-steps/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Sat, 11 Feb 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/49d1ddc5467960588909a97a0530d423/25338/How-To-Be-A-Pro-At-Slack-In-6-Simple-Steps.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you still struggling with Slack at your workplace? Try out these six slack tips along with additional features to become a pro at Slack and let us know some of your own!  &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/how-to-be-a-pro-at-slack-in-6-simple-steps/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[The Ultimate Guide To Create Professional Email Signatures With Examples]]></title><description><![CDATA[Are you signing your emails the right way? Go over this ultimate guide to create professional email signature with some real life examples.]]></description><link>https://www.loginradius.com/blog/growth/ultimate-guide-to-professional-email-signatures-with-examples/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/ultimate-guide-to-professional-email-signatures-with-examples/</guid><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 27 Jan 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f7ecded7be20b74e110a134ebeb7421b/58556/The-Ultimate-Guide-To-Create-Professional-Email-Signatures-With-Examples.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you signing your emails the right way? Go over this ultimate guide to create professional email signature with some real life examples. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/ultimate-guide-to-professional-email-signatures-with-examples/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>10</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Free Resources That You Might Not Have Heard Of]]></title><description><![CDATA[It is said that every good thing comes with a price tag attached. Well, looks like this is not applicable to all good things. The articles lists down some useful free resources you might not have heard of.]]></description><link>https://www.loginradius.com/blog/growth/free-resources-that-you-might-not-have-heard-of/</link><guid isPermaLink="true">https://www.loginradius.com/blog/growth/free-resources-that-you-might-not-have-heard-of/</guid><category><![CDATA[resources]]></category><category><![CDATA[article]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Mon, 23 Jan 2017 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7c56ae71d170759e711a3514e648ccaf/e7487/free-resources-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is said that every good thing comes with a price tag attached. Well, looks like this is not applicable to all good things. The articles lists down some useful free resources you might not have heard of. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/growth/free-resources-that-you-might-not-have-heard-of/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Learn How To Code Using The 10 Cool Websites]]></title><link>https://www.loginradius.com/blog/engineering/learn-to-code-using-10-websites/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/learn-to-code-using-10-websites/</guid><category><![CDATA[Courses]]></category><category><![CDATA[Learning Websites]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Fri, 21 Oct 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/984ce3cc0d4c43ee0925e08cc7b336fc/403a4/How-to-code-using-the-10-cool-websites-768x564-300x220.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Gone are the days when learning coding or programming was reserved for the geeks or nerds. The case is exactly different nowadays. The latest buzz of “How to code” is here to stay. Making sure that you have little coding knowledge under your belt is proving to be an incredible… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/learn-to-code-using-10-websites/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>7</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Personal Branding For Developers: Why and How?]]></title><link>https://www.loginradius.com/blog/engineering/personal-branding-for-developers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/personal-branding-for-developers/</guid><category><![CDATA[Branding]]></category><dc:creator><![CDATA[Sreekant]]></dc:creator><pubDate>Fri, 23 Sep 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cb6590bb3c439f5b33ab6c250865863c/e7487/Personal-Branding-For-Developers-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Many of the developers believe that they are immune to the need of marketing/branding themselves. As a developer your job is to create ultimate applications, right? After all you are not a celebrity or some rockstar! But isn’t it better to be in demand for fruitful consultations… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/personal-branding-for-developers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Sreekant&amp;size=100</authorImage></item><item><title><![CDATA[Customer Identity Preference Trends Q2 2016]]></title><description><![CDATA[Now's the time when you measure expectations for consumer identity and understand what's right for you.]]></description><link>https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q2-2016/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q2-2016/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[social login]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Tue, 16 Aug 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/1a7c1414ed0533bdd5e12eedce7b7780/0f9d5/customer-identity-preference-trends-q2-2016.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Now&apos;s the time when you measure expectations for consumer identity and understand what&apos;s right for you. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q2-2016/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Customer Identity Preference Trends Q1 2016]]></title><description><![CDATA[From the beginning to the end of the customer-business relationship, customer engagement is the central aspect of individual user interactions.]]></description><link>https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q1-2016/</link><guid isPermaLink="true">https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q1-2016/</guid><category><![CDATA[customer identity management]]></category><category><![CDATA[ciam platform]]></category><category><![CDATA[cx]]></category><dc:creator><![CDATA[Rakesh Soni]]></dc:creator><pubDate>Fri, 15 Apr 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/315f9fee85b85360882d50c123194bc2/7ca0e/customer-identity-preference-trends-q1-2016.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; From the beginning to the end of the customer-business relationship, customer engagement is the central aspect of individual user interactions. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/identity/customer-identity-preference-trends-q1-2016/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/oyesoni.png?size=100v=40</authorImage></item><item><title><![CDATA[Wordpress Custom Login Form Part 1]]></title><link>https://www.loginradius.com/blog/engineering/wordpress-custom-login-form-part-1/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/wordpress-custom-login-form-part-1/</guid><category><![CDATA[WordPress]]></category><category><![CDATA[Learning]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Tue, 01 Mar 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/d7e167a0f378c80cdc10b3b3d49b0825/e7487/wordpress-icon-150x1501-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; I often come across people and clients who would like to build their custom login, registration, and lost password form in WordPress instead of using the default wp-login.php page. It&apos;s probably because it&apos;s too wordpress-y. In this tutorial, I will demonstrate how to build a… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/wordpress-custom-login-form-part-1/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[Is Your Database Secured? Think Again]]></title><link>https://www.loginradius.com/blog/engineering/is-your-database-secured-think-again/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/is-your-database-secured-think-again/</guid><category><![CDATA[Database]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Kunal]]></dc:creator><pubDate>Tue, 23 Feb 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ceccb1d10402251d7706ea8d19050b15/403a4/database_secure-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; 1. Secure your server Many known attacks are possible only once physically accessing a machine. For this reason, it is best to have the application server and the database server on different machines. If this is not possible, greater care must be taken, Otherwise, by executing… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/is-your-database-secured-think-again/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>8</timeToReadBlog><authorImage>https://github.com/SuperKunal.png?size=100v=40</authorImage></item><item><title><![CDATA[Be More Manipulative with Underscore JS]]></title><link>https://www.loginradius.com/blog/engineering/be-more-manipulative-with-underscore-js/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/be-more-manipulative-with-underscore-js/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[UnderscoreJs]]></category><dc:creator><![CDATA[Zakary Hughes]]></dc:creator><pubDate>Tue, 16 Feb 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a0908f5af6a6436a7da16f3b91888bed/58556/underscore.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Manipulating collections like arrays and objects can be a hassle with vanilla JS. Thankfully there are libraries like Underscore which offer some extremely useful low level utility functions. Underscore JS provides much of the array/collection/object manipulating functionality… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/be-more-manipulative-with-underscore-js/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zakary Hughes&amp;size=100</authorImage></item><item><title><![CDATA[Extended LinkedIn API Usage]]></title><link>https://www.loginradius.com/blog/engineering/extended-linkedin-api-usage/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/extended-linkedin-api-usage/</guid><category><![CDATA[LinkedIn]]></category><category><![CDATA[SocialLogin]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 09 Feb 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dacf65e1b50df78fc0c763813d3cb64f/403a4/linkedin-feat-img.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; LinkedIn has recently revamped their API systems and added many new restrictions. We will go through some examples on how you can utilize the LinkedIn Javascript API in order to setup some useful features that comply with LinkedIn&apos;s new terms and conditions and use cases. Getting… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/extended-linkedin-api-usage/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Angular Roster Tutorial]]></title><link>https://www.loginradius.com/blog/engineering/angular-roster-tutorial/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/angular-roster-tutorial/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[AngularJS]]></category><category><![CDATA[PlayersArray]]></category><category><![CDATA[Array]]></category><category><![CDATA[Search]]></category><dc:creator><![CDATA[Zakary Hughes]]></dc:creator><pubDate>Tue, 12 Jan 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3fd5bbf61c136944264b54c576652f32/58556/roster-angularjs-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you&apos;re not familiar with Angular I&apos;d highly recommend heading over to the Angular JS resource site and checking out what all the fuss is about. Once you&apos;ve got a basic understanding of Angular and how to get it up and running this tutorial will show you some of the basic, but… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/angular-roster-tutorial/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zakary Hughes&amp;size=100</authorImage></item><item><title><![CDATA[How to Promise]]></title><link>https://www.loginradius.com/blog/engineering/how-to-promise/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-promise/</guid><category><![CDATA[JavaScript]]></category><category><![CDATA[Promise]]></category><dc:creator><![CDATA[Solomon Yu]]></dc:creator><pubDate>Tue, 05 Jan 2016 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/0391ea10a372dcec2e9e04aa7ed59ec0/403a4/promise-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a front-end developer, if you haven&apos;t heard about Promise in Javascript, well ... At least you have heard about it now! And it is truly amazing. Promise is a the standard way of handling asynchronous operations, such as calling APIs. It is comprehensive but elegant, espeically… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-promise/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Solomon Yu&amp;size=100</authorImage></item><item><title><![CDATA[Learning How to Code]]></title><link>https://www.loginradius.com/blog/engineering/learning-how-to-code/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/learning-how-to-code/</guid><category><![CDATA[Learning]]></category><category><![CDATA[Coding]]></category><category><![CDATA[Learning resources]]></category><dc:creator><![CDATA[Carling]]></dc:creator><pubDate>Tue, 29 Dec 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dcadc401834dd794ad2d788dd16ff014/403a4/begin-code-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When you work for a tech company in an office capacity, it feels like everyone around you is speaking another language. Which they are, most of their work exists in coding language. To feel more relevant, I signed up on codecademy.com and started working on their beginner courses… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/learning-how-to-code/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Carling&amp;size=100</authorImage></item><item><title><![CDATA[Delete a Node, Is Same Tree, Move Zeroes]]></title><link>https://www.loginradius.com/blog/engineering/delete-a-node-is-same-tree-move-zeroes/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/delete-a-node-is-same-tree-move-zeroes/</guid><category><![CDATA[Data Structure]]></category><category><![CDATA[JavaScript]]></category><category><![CDATA[Linked List]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Tue, 22 Dec 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/5d9e9ee1d8ffc4932a01a1c72fc15ab7/403a4/code-js-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Delete A Node Click to View the Orginal Question To remove the given node，which means whoever is asking the value for this node should get the value of the next node. Plus, the next node of this removing one should be the next next node. In diagram, with the following node list… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/delete-a-node-is-same-tree-move-zeroes/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[CSS/HTML Animated Dropdown Navigation]]></title><link>https://www.loginradius.com/blog/engineering/csshtml-animated-dropdown-navigation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/csshtml-animated-dropdown-navigation/</guid><category><![CDATA[HTML]]></category><category><![CDATA[CSS]]></category><category><![CDATA[UI]]></category><category><![CDATA[CSS Animation]]></category><dc:creator><![CDATA[Zakary Hughes]]></dc:creator><pubDate>Tue, 15 Dec 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/de68b801e2b33e38132380ed5dfa2f87/403a4/drop-anim-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What&apos;s one thing virtually every website has? If you said navigation (you did) you&apos;re absolutely right! Go ahead and enjoy that wonderful feeling of being right for a moment... and now that we&apos;re feeling like a champ, let&apos;s get to it. Navigation buttons, depending on your site of… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/csshtml-animated-dropdown-navigation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zakary Hughes&amp;size=100</authorImage></item><item><title><![CDATA[Part 2 - Creating a Custom Login Form]]></title><link>https://www.loginradius.com/blog/engineering/part-2-creating-a-custom-login-form/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/part-2-creating-a-custom-login-form/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Login]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Tue, 08 Dec 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c77161283a52150af28cf97603d842a3/e7487/cust-login-2-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial I will demonstrate how to build a custom login form scratch. This time instead of using the default function call Wordpress provides us, we will create this login form and the styling from scratch, making it a very customized form. I will be providing the CSS I… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/part-2-creating-a-custom-login-form/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[Website Authentication Protocols]]></title><link>https://www.loginradius.com/blog/engineering/website-authentication-protocols/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/website-authentication-protocols/</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Oauth]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 01 Dec 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/148a460add8a46784c528ade826702d3/58556/server-proc-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Authentication systems are the backbone of many websites. It allows users to log in to your site and preserving data between visits. It is crucial in offering a robust user experience, which rewards your users for providing their details. Authentications often provide access to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/website-authentication-protocols/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Nim Game, Add Digits, Maximum Depth of Binary Tree]]></title><link>https://www.loginradius.com/blog/engineering/nim-game-add-digits-maximum-depth-of-binary-tree/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/nim-game-add-digits-maximum-depth-of-binary-tree/</guid><category><![CDATA[Nim]]></category><category><![CDATA[JavaScript]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Tue, 24 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/3d4aded531cc491994ddf29e4caf94a0/e7487/nim-blog-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; 1. Nim Game Click to View Original Question This question is very easy once you figure out the trick behind the game.
Since each time you can only pick 3 stones at most, if there are 4 stones originally on the table, no matter how many you take ... your hopefully non-stupid… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/nim-game-add-digits-maximum-depth-of-binary-tree/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[The truth about CSS preprocessors and how they can help you]]></title><link>https://www.loginradius.com/blog/engineering/the-truth-about-css-preprocessors-and-how-they-can-help-you/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/the-truth-about-css-preprocessors-and-how-they-can-help-you/</guid><category><![CDATA[CSS]]></category><dc:creator><![CDATA[Zakary Hughes]]></dc:creator><pubDate>Tue, 17 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c1a3c2e9cd169b0cb2976078dc054b7b/e7487/desdev-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As a preface to this article: preprocessors can be used for a variety of file types, but this article is going to focus solely on CSS preprocessors. Additonally I&apos;m going to try and avoid my personal bias and give a very generic description of CSS preprocessors rather than my… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/the-truth-about-css-preprocessors-and-how-they-can-help-you/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zakary Hughes&amp;size=100</authorImage></item><item><title><![CDATA[Beginner's Guide for Sublime Text 3 Plugins]]></title><description><![CDATA[Getting started with one of the lightweight Code Editor Sublime Text and introduction to Snippets, Project and Macros]]></description><link>https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text-3-part-2/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text-3-part-2/</guid><category><![CDATA[SublimeText]]></category><category><![CDATA[CodeEditor]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 10 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/296e569fc8dd1576c6df798847aaf8ad/7fbdd/Beginner-Guide-Sublime-Text.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Getting started with one of the lightweight Code Editor Sublime Text and introduction to Snippets, Project and Macros &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text-3-part-2/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Displaying the LoginRadius interface in a pop-up]]></title><link>https://www.loginradius.com/blog/engineering/displaying-the-loginradius-interface-in-a-pop-up/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/displaying-the-loginradius-interface-in-a-pop-up/</guid><category><![CDATA[HTML]]></category><category><![CDATA[Login]]></category><category><![CDATA[UI]]></category><category><![CDATA[LoginRadius Interface]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Mon, 09 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b457f6215159c9dcc593ccf7c891be5b/e7487/simplepop-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In order to display your LoginRadius Login Interface in a pop-up you can leverage Jquery-ui which is a well documented, easy-to-use library that allows you to handle some common functionality such as pop-up dialogs and other UI features. In this article we go over the steps to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/displaying-the-loginradius-interface-in-a-pop-up/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Optimize jQuery & Sizzle Element Selector]]></title><link>https://www.loginradius.com/blog/engineering/optimize-jquery-sizzle-element-selector/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/optimize-jquery-sizzle-element-selector/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[JQuery]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 05 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4eb8d5a3c886c469b47f2341713e60af/e7487/jquery-sizzle-element-selector-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Almost every active website worldwide uses jQuery, you can check stats here , but using it without optimization might make the DOM very slow. The same goes for other javascript libraries, such as SizzleJS. To ensure the performance of your DOM, you have to follow some best… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/optimize-jquery-sizzle-element-selector/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Maintain Test Cases in Excel Sheets]]></title><description><![CDATA[Learn how to maintain test cases in Excel sheets]]></description><link>https://www.loginradius.com/blog/engineering/how-to-maintain-test-cases-in-excel-sheets/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-maintain-test-cases-in-excel-sheets/</guid><category><![CDATA[Excel]]></category><category><![CDATA[Tes]]></category><dc:creator><![CDATA[Shefali Yaduvanshi]]></dc:creator><pubDate>Tue, 03 Nov 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e0fafb559e2ab74897544f5b5e92f003/58556/test_cases.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to maintain test cases in Excel sheets &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-maintain-test-cases-in-excel-sheets/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Shefali Yaduvanshi&amp;size=100</authorImage></item><item><title><![CDATA[Separate Drupal Login Page for Admin and User]]></title><link>https://www.loginradius.com/blog/engineering/separate-login-page-for-admin-and-user/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/separate-login-page-for-admin-and-user/</guid><category><![CDATA[Drupal]]></category><category><![CDATA[Admin Panel]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Thu, 29 Oct 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/9e0cd76a1ad2ed809f396189f3db918c/58556/drupal.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you afraid of hackers and feel unsafe for admin and front user to login through same area? No need to worry as in this article, I am going to guide you with how to create separate login area for admin. Along with that, I will also provide the required steps to disable… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/separate-login-page-for-admin-and-user/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[How to Get Email Alerts for Unhandled PHP Exceptions]]></title><link>https://www.loginradius.com/blog/engineering/how-to-get-email-alerts-for-unhandled-php-exceptions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/how-to-get-email-alerts-for-unhandled-php-exceptions/</guid><category><![CDATA[PHP]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Mon, 26 Oct 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7cc01786c805c6dabe755c22c0e6b3fb/7fbdd/email-alerts-unhandled-php.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; This tutorial provides a solution to get email alerts, when a unhandled error occurs. For this tutorial, we are using WordPress. Imagine you created a php application and it’s running fine.  A couple of days later, a user complains about an error which you’re totally unaware of… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/how-to-get-email-alerts-for-unhandled-php-exceptions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[ElasticSearch Analyzers for Emails]]></title><link>https://www.loginradius.com/blog/engineering/elastic-search-analyzers-for-emails/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/elastic-search-analyzers-for-emails/</guid><category><![CDATA[Elastic Search]]></category><category><![CDATA[Analyzers]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Thu, 15 Oct 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20f8b4ec6bff03779c688504a1290883/58556/elastic-search.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; So last week while I was setting the analyzers on ElasticSearch settings for Email field, it took me some good time to find the perfect custom analyzer for my purpose, so I feel it might be useful to share this with someone who needs it. When a document is indexed, its individual… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/elastic-search-analyzers-for-emails/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[Social Media Solutions]]></title><link>https://www.loginradius.com/blog/engineering/simple-social-media-solutions/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/simple-social-media-solutions/</guid><category><![CDATA[Social Media]]></category><category><![CDATA[Social Login]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Thu, 08 Oct 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4cfc9b0367107177ef79aa1662de925a/58556/social-media.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Integrating social into your site can drastically improve user engagement with your platform. Below are a few useful solutions and implementation instructions. Social Login Social Login, also known as Social Sign On, Allows you to bypass traditional registration forms and utilize… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/simple-social-media-solutions/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Types of Authentication in Asp.Net]]></title><description><![CDATA[Learn types of Authentication in Asp.Net and how it plays an important role in any system.]]></description><link>https://www.loginradius.com/blog/engineering/alternate-authentication-asp/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/alternate-authentication-asp/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Authentication]]></category><category><![CDATA[Asp.Net]]></category><category><![CDATA[Multipass]]></category><category><![CDATA[JWT]]></category><category><![CDATA[JSON Web Token]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Thu, 01 Oct 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/051582b8bfe0e3796cdccd575e275a97/e7487/alternate-authentication-asp-dot-net1-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn types of Authentication in Asp.Net and how it plays an important role in any system. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/alternate-authentication-asp/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Using Facebook Graph API After Login]]></title><link>https://www.loginradius.com/blog/engineering/using-facebook-graph-api-after-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/using-facebook-graph-api-after-login/</guid><category><![CDATA[Facebook]]></category><category><![CDATA[Graph API]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 29 Sep 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8622c2fa04e9260ffffdf4635ebfb067/e7487/fb-feat-img-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Facebooks Graph API gives you the ability to better understand and target content to your user. In this blog we go over some useful implementations of the Graph API that you can use to pull in user data as well as publish on your users behalf. Getting Your Site Ready The first… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/using-facebook-graph-api-after-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Hi, My Name is Darryl, and This is How I Work]]></title><link>https://www.loginradius.com/blog/engineering/my-name-is-darryl-this-is-how-work/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/my-name-is-darryl-this-is-how-work/</guid><category><![CDATA[Tools]]></category><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 22 Sep 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/73f818bb44071a33e66d0518c85bb5ff/403a4/darryl-how-i-work-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Ever wondered how I work? No? Well, too bad, I&apos;m still gonna write about it. Hello and welcome to a blog post dedicated to me. In this episode, I&apos;m going to tell you about the tools I use, the things I do to get design inspiration, and what I do when I get stuck on a project. Let… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/my-name-is-darryl-this-is-how-work/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Beginner's Guide for Sublime Text 3]]></title><description><![CDATA[Getting started with one of the lightweight Code Editor Sublime Text and it's package control and shortcut commends]]></description><link>https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text/</guid><category><![CDATA[SublimeText]]></category><category><![CDATA[CodeEditor]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 15 Sep 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/296e569fc8dd1576c6df798847aaf8ad/7fbdd/Beginner-Guide-Sublime-Text.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Getting started with one of the lightweight Code Editor Sublime Text and it&apos;s package control and shortcut commends &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/beginners-guide-for-sublime-text/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Social Network Branding Guidelines]]></title><link>https://www.loginradius.com/blog/engineering/social-network-branding-guidelines/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/social-network-branding-guidelines/</guid><category><![CDATA[Social]]></category><category><![CDATA[SocialLogin]]></category><category><![CDATA[Branding]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 08 Sep 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/63460374fc13a4962cd40dfa765485b1/403a4/social-network-branding-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; I am here to tell you that Facebook, Google, Twitter, or LinkedIn aren’t going to be happy when they find out that you changed their icon color to green. But, hey at least you didn’t distort the logo. Hello and welcome to another segment of me telling you things that you need to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/social-network-branding-guidelines/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Index in MongoDB]]></title><link>https://www.loginradius.com/blog/engineering/index-in-mongodb/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/index-in-mongodb/</guid><category><![CDATA[MongoDB]]></category><category><![CDATA[Database]]></category><dc:creator><![CDATA[Mark Duan]]></dc:creator><pubDate>Tue, 01 Sep 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e5befb74a597194f6d10cdce76d28a00/58556/mongo-db-index1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Index is a typical way to speed-up queries in normal database system. There is no difference between MongoDB and a document-based database system. This article gives insight about the index in MongoDB, for query optimization. Index in Mongo: Default _id is an ObjectId object, 1… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/index-in-mongodb/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Mark Duan&amp;size=100</authorImage></item><item><title><![CDATA[How to ab-USE CSS2 sibling selectors]]></title><link>https://www.loginradius.com/blog/engineering/ab-use-css2-sibling-selectors/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/ab-use-css2-sibling-selectors/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[Selector]]></category><category><![CDATA[CSS]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 18 Aug 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/bc4587907a3f51743e5602c5512e6236/7fbdd/sibling-selectors.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Hey there, spider. It’s me again, your amazing blog writer, Darryl. Have you ever wanted to select the second or third child of an element without using CSS3 nth-child —which aren’t working on grandpa browsers. Let’s face it, a lot of human beings are afraid of change that they… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/ab-use-css2-sibling-selectors/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Customize User Login, Register and Forgot Password  Page in Drupal 7]]></title><link>https://www.loginradius.com/blog/engineering/customize-user-login-register-and-forgot-password-page-in-drupal-7/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/customize-user-login-register-and-forgot-password-page-in-drupal-7/</guid><category><![CDATA[Drupal]]></category><dc:creator><![CDATA[Versha Gupta]]></dc:creator><pubDate>Tue, 11 Aug 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7d36e49fa408c02e5e79fd3e845c9379/7fbdd/drupal-custom-login-register-password-pages1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Did you ever want to customize your registration or login page on Drupal 7, but did not know how? Customizing these pages by adding new text or changing theme is not a difficult task. To help you out with that, I have compiled some simple steps to customize your registration or… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/customize-user-login-register-and-forgot-password-page-in-drupal-7/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/vershagupta.png?size=100v=40</authorImage></item><item><title><![CDATA[Best practice for reviewing QQ app]]></title><link>https://www.loginradius.com/blog/engineering/best-practice-reviewing-qq-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/best-practice-reviewing-qq-app/</guid><category><![CDATA[SocialLogin]]></category><category><![CDATA[QQ]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 04 Aug 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a89009e858e98fb020d251158f47dd23/7fbdd/qq-app-review-best-practices.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; QQ is the most popular ID provider for Chinese people since the 90s, it is always the first choice for websites who want to provide social login functionality for their Chinese users. But similar to other ID providers from China, the app you created needs to be reviewed before… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/best-practice-reviewing-qq-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[CSS3 Responsive Icons]]></title><link>https://www.loginradius.com/blog/engineering/css3-responsive-icons/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/css3-responsive-icons/</guid><category><![CDATA[CSS]]></category><category><![CDATA[Responsive]]></category><category><![CDATA[UI]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 21 Jul 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/8d212eebb7243269b59bd9166d0a4cce/403a4/css3-responsive-icons-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What’s up, my neighbor? This is your boy, Darryl Tec. I am here to teach you how to create a responsive and awesomely scalable icon using CSS sprites. On top of that, we will also add a fallback for browsers that do not support SVG files. Quick FAQ. SVG - Stands for Scalable… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/css3-responsive-icons/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Write a highly efficient python Web Crawler]]></title><link>https://www.loginradius.com/blog/engineering/write-a-highly-efficient-python-web-crawler/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/write-a-highly-efficient-python-web-crawler/</guid><category><![CDATA[Python]]></category><category><![CDATA[Coding]]></category><dc:creator><![CDATA[Mark Duan]]></dc:creator><pubDate>Tue, 14 Jul 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c068d4f41cc4f2a33e3bd2737ca105df/7fbdd/python-web-crawler.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; As my previous blog, I use the python web Crawler library to help crawl the static website. For the Scrapy, there can be customize download middle ware, which can deal with static content in the website like JavaScript. However, the Scrapy already helps us with much of the… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/write-a-highly-efficient-python-web-crawler/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Mark Duan&amp;size=100</authorImage></item><item><title><![CDATA[Memcached Memory Management]]></title><link>https://www.loginradius.com/blog/engineering/memcach-memory-management/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/memcach-memory-management/</guid><category><![CDATA[Memory Management]]></category><dc:creator><![CDATA[Mark Duan]]></dc:creator><pubDate>Tue, 07 Jul 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/283a834484b5b25cf8471e04a8e2ff1b/7fbdd/memcached-memory-management.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; The  memcached is one of the most popular open source on-memory key-value caching systems. I will briefly talk about the design of memory management of memcached. Chunk and Slab memcached-1 This is the struct declaration of slabclass_t. Each slab class contains the same size of… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/memcach-memory-management/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Mark Duan&amp;size=100</authorImage></item><item><title><![CDATA[HTML5 Limitation in Internet Explorer]]></title><link>https://www.loginradius.com/blog/engineering/html5-limitation-in-internet-explorer/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/html5-limitation-in-internet-explorer/</guid><category><![CDATA[Java]]></category><category><![CDATA[Maven]]></category><category><![CDATA[Eclipse]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 30 Jun 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20127eac7a49d6d333dd2483a84b5c4c/7fbdd/radio-check-buttons-css.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; HTML 5 is the latest and greatest web technology, although it has some issues in some browsers which don’t have native support for the new HTML5 elements. If you want to support some of the older browsers which may still be in use such as IE8 and lower then you are going to have… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/html5-limitation-in-internet-explorer/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[What is an API]]></title><link>https://www.loginradius.com/blog/engineering/what-is-an-api/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/what-is-an-api/</guid><category><![CDATA[API]]></category><category><![CDATA[Postman]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Tue, 23 Jun 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/a01dd1d7515afffa79ea80811d70b895/403a4/whats-an-api-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; An API is an acronym for Application Programming Interface. API&apos;s include various tools, protocols, and routines. API&apos;s are used as a way for applications to communicate with various systems. But what does this mean? Well let me explain what they are with some examples. I am… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/what-is-an-api/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[Styling Radio and Check buttons with CSS]]></title><link>https://www.loginradius.com/blog/engineering/styling-radio-and-check-buttons-with-css/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/styling-radio-and-check-buttons-with-css/</guid><category><![CDATA[CSS]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 16 Jun 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/20127eac7a49d6d333dd2483a84b5c4c/7fbdd/radio-check-buttons-css-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Let&apos;s face it, at some point you look at a radio or a checkbox button and you&apos;re like... this looks like something that starts with an &quot;s&quot; and ends with a &quot;hit&quot;. I&apos;m here to stop you from saying that word and go on with your life without worrying about those ugly things. We&apos;re… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/styling-radio-and-check-buttons-with-css/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Configuring Your Social Sharing Buttons]]></title><link>https://www.loginradius.com/blog/engineering/configuring-social-sharing-buttons/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/configuring-social-sharing-buttons/</guid><category><![CDATA[SocialSharing]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 09 Jun 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/24799a6bff48ea3ac4e96368c579f88b/403a4/configuring-social-share-buttons-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social sharing button offers an easy way to distribute your content to a wider audience. The major social providers allow options to configure the content that will be shared programmatically. In this guide we explore the options that you can use in order to configure the shared… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/configuring-social-sharing-buttons/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Shopify Embedded App]]></title><link>https://www.loginradius.com/blog/engineering/shopify-embedded-app/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/shopify-embedded-app/</guid><category><![CDATA[Shopify]]></category><category><![CDATA[PHP]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Tue, 02 Jun 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c5210d2bc3581dbaa177626908ec770c/53cab/shopify.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Recently, I was working on an implementation to build an embedded app on Shopify with PHP. I realized that the 3rd party PHP SDK recommended by Shopify called &quot;phpish&quot; does not support the feature to &quot;PUT&quot; assets into your shopify shop&apos;s theme. The link to &quot;phpish&quot; git repository… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/shopify-embedded-app/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[API Debugging Tools]]></title><link>https://www.loginradius.com/blog/engineering/api-debugging-tools/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/api-debugging-tools/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[GoogleChorme]]></category><category><![CDATA[MozilaFirefox]]></category><category><![CDATA[SoupUI]]></category><category><![CDATA[RunScope]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Tue, 26 May 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/e2aa1e0f5566cdcc1948cf54ce59632d/403a4/api_debugging-tools-300x300.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you having trouble with accessing API endpoint?   Unsure why your API is not returning data? Most modern browsers have tools or plugins that allows you to quickly and easily test your API calls and see the sample returned data. In this post we go through some tools available… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/api-debugging-tools/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Use PHP to generate filter portfolio]]></title><link>https://www.loginradius.com/blog/engineering/use-php-to-generate-filter-portfolio/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/use-php-to-generate-filter-portfolio/</guid><category><![CDATA[PHP]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Tue, 19 May 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/2bded56c56b18fac13fd210a0d98e4db/7fbdd/php-filter-portfolio.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Overview Filter Portfolio can be very useful for websites, especially when there is a lot of images you want to show to users. It is always nice to keep it into different categories and allow your user to play with them. But adding a tag and a div on hundreds of images is… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/use-php-to-generate-filter-portfolio/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[Password Security]]></title><link>https://www.loginradius.com/blog/engineering/password-secure/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/password-secure/</guid><category><![CDATA[Security]]></category><category><![CDATA[Password]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Thu, 14 May 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cc21bc708f0fdfa3428eecb3a473023b/7fbdd/password-security.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; When we start thinking about authentication in any kind of software (it can be web, mobile, desktop, or even console), the first thing that comes to mind is username/password, this is an older but still effective technique to protect and identify users. Securing these passwords… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/password-secure/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Loading spinner using CSS]]></title><description><![CDATA[Learn how to create a loading spinner using CSS]]></description><link>https://www.loginradius.com/blog/engineering/create-a-loading-spinner-using-css/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/create-a-loading-spinner-using-css/</guid><category><![CDATA[CSS]]></category><category><![CDATA[Loader]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 05 May 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/7892c56df8d6f6a460669e168ad41a70/7fbdd/css3-loading-spinner.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to create a loading spinner using CSS &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/create-a-loading-spinner-using-css/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[RDBMS vs NoSQL]]></title><description><![CDATA[Learn about RDBMS and NoSQL Database systems, their differences, benefits and limitations]]></description><link>https://www.loginradius.com/blog/engineering/relational-database-management-system-rdbms-vs-nosql/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/relational-database-management-system-rdbms-vs-nosql/</guid><category><![CDATA[Database]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 28 Apr 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/f5c32ff4008853f989d5847a4fb3b139/7fbdd/rdbms-vs-nosql.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn about RDBMS and NoSQL Database systems, their differences, benefits and limitations &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/relational-database-management-system-rdbms-vs-nosql/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Cloud storage vs Traditional storage]]></title><link>https://www.loginradius.com/blog/engineering/cloud-storage-vs-traditional-storage/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/cloud-storage-vs-traditional-storage/</guid><category><![CDATA[Cloud]]></category><category><![CDATA[Storage]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Tue, 21 Apr 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/ec860aadce60db7e207314a0453a6853/7fbdd/cloud-vs-traditional-storage-1.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; With Information Technology becoming more and more Cloud based nowadays (due to industry demanding reliability and scalability in their infrastructure), the Cloud storage system has become a very feasible solution. Various organizations are migrating their data to cloud storage… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/cloud-storage-vs-traditional-storage/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Getting Started with Phonegap]]></title><link>https://www.loginradius.com/blog/engineering/getting-started-phonegap/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/getting-started-phonegap/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[PhoneGap]]></category><category><![CDATA[Mobile]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Tue, 31 Mar 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/02771814b93eac090637b118855c7008/22f90/dev-sprites2.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; PhoneGap now also known as Apache Cordova, is a powerful tool for mobile development which allows you to develop in HTML/JS markup and quickly generate out various mobile compatible apps. This prevents your developers from having to learn and understand multiple platform specific… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/getting-started-phonegap/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[Animate the modal popup using CSS]]></title><description><![CDATA[Learn how to animate the modal popup using CSS keyframe]]></description><link>https://www.loginradius.com/blog/engineering/animating-simple-css-popup-tutorial/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/animating-simple-css-popup-tutorial/</guid><category><![CDATA[Slide]]></category><category><![CDATA[CSS]]></category><category><![CDATA[Swirl]]></category><category><![CDATA[PopUp]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Mon, 23 Mar 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fd58cd8b2750bcda4251057bf96d6b25/ad85c/simplepop.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn how to animate the modal popup using CSS keyframe &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/animating-simple-css-popup-tutorial/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>5</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[CSS Responsive Grid, Re-imagined]]></title><link>https://www.loginradius.com/blog/engineering/css-responsive-grid/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/css-responsive-grid/</guid><category><![CDATA[CSS]]></category><category><![CDATA[Grid]]></category><category><![CDATA[Responsive]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Mon, 16 Mar 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b965f64c315a9fddcd7037c0d1e1441f/ad85c/desdev.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; I know what you&apos;re thinking. Why am I writing this blog? There&apos;s like a bunch of apps out there that do this thing automatically. See, that&apos;s the problem, &quot;automatically&quot;. That means you have no control over it when it messes things up. Even if you do, you might mess things up… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/css-responsive-grid/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>3</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[An Intro to Curl & Fsockopen]]></title><link>https://www.loginradius.com/blog/engineering/intro-curl-fsockopen/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/intro-curl-fsockopen/</guid><category><![CDATA[curl]]></category><category><![CDATA[Fsock]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Mon, 09 Mar 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/60c66ca2257d555ebf5e86ccaa6d56c8/403a4/fsock-and-curl.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; What are they? cURL and Fsock are both methods used to communicate with different types of servers using communication protocols. Fsock is included in PHP and cURL is a library that can be installed on a server or utilized on many different platforms. Example: cURL- Fsock- How to… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/intro-curl-fsockopen/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[Enqueuing Scripts in WordPress]]></title><link>https://www.loginradius.com/blog/engineering/enqueuing-scripts-wordpress/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/enqueuing-scripts-wordpress/</guid><category><![CDATA[WordPress]]></category><category><![CDATA[PHP]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Mon, 02 Mar 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/4e9051d7a28e019245372bfa4f533083/e557c/wordpress.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this tutorial I want to explain the different methods to enqueue scripts and style sheets in WordPress. This can be a really confusing process for new WordPress developers. There are three different areas that a developer can enqueue scripts for; the first is the client side… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/enqueuing-scripts-wordpress/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[How to Implement Facebook Social Login]]></title><link>https://www.loginradius.com/blog/engineering/implement-facebook-social-login/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/implement-facebook-social-login/</guid><category><![CDATA[Facebook]]></category><category><![CDATA[SocialLogin]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Tue, 24 Feb 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/6c361cdd8b58e5ed76e50ba960c74e49/403a4/fb-feat-img.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; In this post I will show you how easy it is to implement Facebook social login to a web page using Facebook’s JavaScript SDK. The nice thing about Facebook social login is the great documentation and instructions already provided at  Facebook Login for the Web. There is also a… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/implement-facebook-social-login/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[GUID Query Through Mongo Shell]]></title><link>https://www.loginradius.com/blog/engineering/guid-query-mongo-shell/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/guid-query-mongo-shell/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[GUID]]></category><category><![CDATA[Mongo]]></category><dc:creator><![CDATA[Kundan Singh]]></dc:creator><pubDate>Mon, 23 Feb 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/cf4e048dfb4a9d2610d3137dfaa7b5e7/403a4/mongo-db-guid.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; If you have stored a GUID through the C# driver to mongoDB and now you want to run a query by GUID, you can&apos;t query directly because mongoDB doesn&apos;t recognize GUID so when we query through mongo shell no result will be returned. To use the power of mongo shell for querying data… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/guid-query-mongo-shell/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Kundan Singh&amp;size=100</authorImage></item><item><title><![CDATA[Integrating LinkedIn Social Login on a Website]]></title><link>https://www.loginradius.com/blog/engineering/integrate-linkedin-social-login-website/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/integrate-linkedin-social-login-website/</guid><category><![CDATA[LinkedIn]]></category><category><![CDATA[SocialLogin]]></category><dc:creator><![CDATA[Lucius Yu]]></dc:creator><pubDate>Wed, 11 Feb 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/dacf65e1b50df78fc0c763813d3cb64f/403a4/linkedin-feat-img.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; It is important nowadays to allow your user to sign in to your website with their social network account. It provides a better experience for your user and also lets you obtain more information about your user. The most welcomed social platforms are Facebook, Twitter, LinkedIn… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/integrate-linkedin-social-login-website/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Lucius Yu&amp;size=100</authorImage></item><item><title><![CDATA[Social Provider Social Sharing Troubleshooting Resources]]></title><link>https://www.loginradius.com/blog/engineering/social-provider-social-sharing-troubleshooting-resources/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/social-provider-social-sharing-troubleshooting-resources/</guid><category><![CDATA[Engineering]]></category><category><![CDATA[SocialSharing]]></category><category><![CDATA[Facebook]]></category><category><![CDATA[Google]]></category><category><![CDATA[LinkedIn]]></category><dc:creator><![CDATA[Karl Wittig]]></dc:creator><pubDate>Mon, 09 Feb 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/93b68aeb2b2537eb1ada887c2289dc4c/58556/social.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Social Sharing is an extremely powerful tool to expand your user base and product recognition, customizing and implementing this to be efficient on your site can be quiet difficult. Most of the most relevant Social Providers have setup testing and troubleshooting tools that can… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/social-provider-social-sharing-troubleshooting-resources/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>2</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Karl Wittig&amp;size=100</authorImage></item><item><title><![CDATA[Social Media Colors in Hex]]></title><link>https://www.loginradius.com/blog/engineering/social-media-colors-hex/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/social-media-colors-hex/</guid><category><![CDATA[SocialMedia]]></category><category><![CDATA[Facebook]]></category><category><![CDATA[Google]]></category><category><![CDATA[Color]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Fri, 06 Feb 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/fe80482126ca4794c0c2411058451279/e7487/darrylblog1-150x150.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Are you tired of eye dropping (or worse… guessing) the colors of every social network you like? Fear not my friend, I have searched the webs to find our beloved social media colors and listed it out in hex form. Facebook #3b5998 Google Plus #F90101 Linkedin #007bb6 Twitter… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/social-media-colors-hex/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[W3C Validation: What is it and why to use it?]]></title><description><![CDATA[Learn what w3c is and why to use it, and also how to validate your web page for W3C standards, a simple guide on W3C validation.]]></description><link>https://www.loginradius.com/blog/engineering/w3c-validation/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/w3c-validation/</guid><category><![CDATA[W3C]]></category><category><![CDATA[Validation]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Mon, 26 Jan 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/61a5831ae676536f6f686f26efd47eea/58556/w3c.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Learn what w3c is and why to use it, and also how to validate your web page for W3C standards, a simple guide on W3C validation. &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/w3c-validation/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>4</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item><item><title><![CDATA[A Simple Popup Tutorial]]></title><link>https://www.loginradius.com/blog/engineering/simple-popup-tutorial/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/simple-popup-tutorial/</guid><category><![CDATA[HTML]]></category><category><![CDATA[CSS]]></category><category><![CDATA[UI]]></category><dc:creator><![CDATA[Zoie Carnegie]]></dc:creator><pubDate>Mon, 05 Jan 2015 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/c6bf325c9c408389282535e3a446b575/58556/simplepop.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Creating a popup is a very simple addition to any webpage. In this tutorial, I will show you how to create a popup using basic Html, javascript and CSS. The first thing we want to think about is what we want to do to trigger a popup. You can trigger an event on almost anything… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/simple-popup-tutorial/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>6</timeToReadBlog><authorImage>https://ui-avatars.com/api/?name=Zoie Carnegie&amp;size=100</authorImage></item><item><title><![CDATA[Hello developers and designers!]]></title><link>https://www.loginradius.com/blog/engineering/hello-developers-and-designers/</link><guid isPermaLink="true">https://www.loginradius.com/blog/engineering/hello-developers-and-designers/</guid><category><![CDATA[Engineering]]></category><dc:creator><![CDATA[Team LoginRadius]]></dc:creator><pubDate>Fri, 02 May 2014 00:00:00 GMT</pubDate><enclosure url="https://www.loginradius.com/static/b965f64c315a9fddcd7037c0d1e1441f/ad85c/desdev.webp" length="768" type="image/jpeg"/><content:encoded>&lt;p&gt; Welcome to our new initiative to contribute and spread the learnings/findings we had working with LoginRadius API! We always try to come up with new ideas/process during our development and research sessions..sometimes they are funny but awesome. :). We&apos;ll share those ideas and… &lt;/p&gt; &lt;br/&gt;  &lt;a href=&quot;https://www.loginradius.com/blog/engineering/hello-developers-and-designers/&quot;&gt;Read On&lt;/a&gt;</content:encoded><timeToReadBlog>1</timeToReadBlog><authorImage>https://github.com/LoginRadius.png?size=100v=40</authorImage></item></channel></rss>