With more companies moving their business models online and adopting new solutions, it’s been opening up more opportunities for cybercrime and identity theft. The spread of Covid-19 has only made it worse, as the Federal Trade Commission (FTC) estimated a loss of $13.4 million to Covid-19 scams as of April 15, 2020.

The Current Scenario

This makes the protection of digital identity more important than ever before. This is also a new era of identity authentication. With artificial intelligence (AI) and biometrics, users today are enjoying more streamlined processes while reaping the benefits of added security.

Let’s take a further…


With technology evolving in leaps and bounds, AI is shaping the future of digital transformation for every business seeking speed, scalability, quality and flexibility.

Since DevOps is on the verge of delivering exceptional software development environments, DevOps in AI is undeniably the next breakthrough in technology. We’ve witnessed every industry racing toward the adoption of AI to transform their business. To support this transformation, smart automation solutions coupled with AI implementations is becoming the new normal.

So if you’re thinking about reinforcing your enterprise’s DNA by leveraging AI, DevOps principles for artificial intelligence are vital to these efforts. …


When it comes to Digital Identity concepts, Authentication is one of the most important. The previous articles of the Guide to Digital Identity series have included the knowledge bundle for it. In continuation, this article is dedicated to Single Sign-On (SSO), which is also an authentication concept.

What is Single Sign-on (SSO) and how it works

Single Sign-On (SSO) refers to the authentication process that allows consumers to access multiple applications with a single login credential and an active login session. The following are the two examples of the Single Sign-On environments:

  • Consumers access multiple applications of the same provider; they don’t need to create and remember separate credentials…

Operating in a multi-cloud environment is rapidly becoming the norm for most companies. In 2018, research from the IBM Institute for Business Value found that 85% of companies were already using a multi-cloud plan, and 98% had plans to use multiple hybrid clouds by 2021.

Fast-forward to 2021, one year into a global pandemic, and now the push to develop a comprehensive multi-cloud strategy has even more urgency. Businesses are managing distributed workforces and relying on multiple cloud platforms for both internal and customer-facing applications.

And remote work in some capacity is likely to remain a permanent fixture in the…


In 2020, consumer data is the most valuable asset for businesses, and cybercriminals are well aware of this fact. It’s no wonder that standards for protecting digital identities are one of the hottest topics today among CIOs and other executives.

Digital transformation is no longer optional. Your business either adapts and thrives, or stays the course and flounders. It’s as simple (and complex) as that. Every business is going digital, and it’s the role of the CIO to lead the vanguard when it comes to managing digital assets.

Digital Transformation: An Overview

Digital transformation is a double-edged sword. It has changed the way we…


Developer, tech entrepreneur and cybersecurity leader. Co-Founder and CTO of LoginRadius, a cloud-based consumer identity platform.

Every day, we are creating and sharing data at an astounding rate. With each email, text, tweet, tap and stream, more data is available for companies to collect and use, and without sufficient protections, for hackers to exploit.

The collective sum of global data is predicted to grow from 33 zettabytes (33 trillion gigabytes) in 2018 to 175 zettabytes in 2025, according to a report from IDC and Seagate. As the vast amount of consumer data continues to grow each year, so does the…


2FA or MFA (Two or Multi-Factor Authentication)

The two-factor (2FA) or multi-factor authentication (MFA) method uses two or more factors to authenticate a user. It is considered more secure than the conventional single-factor authentication method described in the previous article (Guide to Digital Identity — Part 2).

Due to the digital age, so much of our lives are happening on laptops and mobile devices, and cybercriminals often attack our digital accounts. 2FA or MFA forms an extra layer of protection to provide a more secure authentication process and helps in slowing down the rate of cybercrime.

Two authentication methods, step-up and adaptive authentication, both use 2FA or…


In the previous article (Guide to Digital Identity-Part 1), we talked about the basics of digital identity and authentication methods. (If you haven’t already read it, read it now!).

The purpose of this article is to help you understand when to use which authentication method. We will talk about the details, pros and cons, and use cases of the various authentication methods.

Let’s start with the fundamental authentication methods introduced in part 1.

Password-Based Authentication

This method requires a unique id and password for authentication. The unique id could be an email address, username, or phone number.

The following are the types…


The global media and entertainment industry is undergoing a massive transformation at the moment. Interestingly, it is adapting itself to improve customer experiences like never before.

Today, enterprises know that if they want to stay ahead of their competitors, they need to keep their customers happy.

So, how are they doing it? It’s simple. They are focusing on generating more and more customer-centric content.

2019 (for that matter) experienced an intensifying wave of popularity for on-demand streaming sites like Amazon and Netflix. The recently launched BritBox also primarily focuses on driving better media experience for their customers.

LoginRadius explores these…


As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory compliances.

From the EU’s General Data Protection Regulation (GDPR) to the recently released California’s Consumer Privacy Act (CCPA), each regulation has a unique strategic imperative.

  • The European Union’s GDPR came into force on May 25, 2018, to protect the personally identifiable information (PII) of its citizens.
  • Likewise, on January 1, 2020, the California Consumer Privacy Act (CCPA) went live, affecting millions of companies with its share of new consumer rights.

Businesses cannot afford to ignore…

Deepak Gupta

CyberSecurity innovator and author. Developer at heart. Co-founder/CTO of @LoginRadius, 🇮🇳 learn more — https://guptadeepak.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store