Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher
  • Blog
  • Publications
  • Videos
  • About
  • Contact
Sign in Subscribe
Understanding Hashing Algorithms: A Beginner's Guide
hashing

Understanding Hashing Algorithms: A Beginner's Guide

Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features
Mar 31, 2023 6 min read
2021-2022: How LoginRadius’s DevOps Delivered Beyond Expectations?
devops

2021-2022: How LoginRadius’s DevOps Delivered Beyond Expectations?

We have re-engineered the LoginRadius CIAM platform to meet enterprise customers' growing needs. In this process, the DevOps team's relentless efforts have pushed the limits and enhanced infrastructure, security, and scalability.
Mar 9, 2023 4 min read
BYOI: Empowering Individuals to Take Control of Their Digital Identities
digital identity

BYOI: Empowering Individuals to Take Control of Their Digital Identities

BYOI, or Bring Your Own Identity, is an increasingly popular concept in identity and access management
Mar 6, 2023 4 min read
2022: A Year of Significant QA Transformation at LoginRadius
innovation

2022: A Year of Significant QA Transformation at LoginRadius

how we transformed QA to support engineering efforts and deliver a more robust and efficient platform free of production issues for our customers
Feb 23, 2023 3 min read
Can AI Write an Emotional Poem or Song?
AI (Artificial Intelligence)

Can AI Write an Emotional Poem or Song?

AI has become increasingly influential in recent years and can perform various tasks, but can it create something as complex and personal as a poem or song?
Feb 20, 2023 2 min read
2022 - An Year of Engineering Resilience at LoginRadius
loginradius

2022 - An Year of Engineering Resilience at LoginRadius

The year 2022 marked a significant turning point for the LoginRadius CIAM platform, as our tech team re-engineered the entire system to meet the growing demands of our customers.
Feb 9, 2023 5 min read
Minimizing Credential Theft With MFA
MFA

Minimizing Credential Theft With MFA

Phishing is a significant business threat and can lead to financial and reputational damages. And minimizing the risk of credential theft through phishing attacks requires a rigorous defense against credential theft
Jan 23, 2023 4 min read
5 Areas Where CIAM Is More Than An IT Responsibility
CIAM

5 Areas Where CIAM Is More Than An IT Responsibility

CIAM becomes prominent and requires cross-functional collaboration and deliberate decision-making
Jan 16, 2023 4 min read
Built-in Authentication Security Mechanisms to Reinforce Platform Security
authentication

Built-in Authentication Security Mechanisms to Reinforce Platform Security

By incorporating built-in platform authentication mechanisms, including MFA and adaptive authentication, you can build the trust of your customers by showing that you care about their safety.
Jan 12, 2023 5 min read
AI and Emotional Intelligence (EI): A Look into the Future
AI (Artificial Intelligence)

AI and Emotional Intelligence (EI): A Look into the Future

AI and emotional intelligence have the potential to revolutionize the way humans interact with technology
Jan 9, 2023 4 min read
CISO’s Guide to Secure Software Development
CISO

CISO’s Guide to Secure Software Development

Developing and following a strategy, use of the right tools and ensuring your entire organization is committed to application security can reduce the chances of a data breach, safeguard the bottom line and protect your business’s reputation.
Jan 5, 2023 4 min read
What is Zero-Day Vulnerability?
cyber security

What is Zero-Day Vulnerability?

Zero-day vulnerabilities can be very dangerous because malicious people can use them to access systems and data without being detected.
Dec 27, 2022 3 min read
How to build a cybersecurity team for startup
startup

How to build a cybersecurity team for startup

How to build a cybersecurity team for a startup, what things to do and how to keep it lean
Dec 21, 2022 1 min read
How to Set up Your Go-to-Market Tech Stack for a Product-Led Company
startup

How to Set up Your Go-to-Market Tech Stack for a Product-Led Company

By investing in the right tech stack for GTM, product-led companies can better understand their customers and drive growth efficiently
Dec 19, 2022 4 min read
Making your Business Cyber Secure - Must do
startup

Making your Business Cyber Secure - Must do

What should you do to make your business cyber secure and steps to improve security
Dec 14, 2022 1 min read
5 Common RESTful API Security Risks and How to Protect Against Them
API

5 Common RESTful API Security Risks and How to Protect Against Them

RESTful APIs are still vulnerable to various security risks. In this article, we will explore five common RESTful API security risks and discuss how to protect against them.
Dec 12, 2022 2 min read
How ChatGPT Will Help Creators To Optimize Social Media
AI (Artificial Intelligence)

How ChatGPT Will Help Creators To Optimize Social Media

Applications of ChatGPT and OpenAI tools to make human-like conversations based on user prompts
Dec 8, 2022 1 min read
What is Password Hashing Algorithm?
password

What is Password Hashing Algorithm?

What are various password hashing algorithms, their pros and cons, and how can they protect users' accounts?
Dec 5, 2022 2 min read
Social Media for Personal Brand
Best Practices

Social Media for Personal Brand

Are you an aspiring personal brand or a business owner without a strong personal presence? In this post, you will learn how to build your personal brand on social media.
Dec 5, 2022 12 min read
Here's Why Passwordless Authentication Is Better for the Business Environment
password

Here's Why Passwordless Authentication Is Better for the Business Environment

Passwordless authentication is becoming more popular among businesses prioritizing their users' and employees' security and digital experience. Here's why.
Nov 28, 2022 4 min read
Why Just Collecting More and More Data Is No Longer Productive
customer data

Why Just Collecting More and More Data Is No Longer Productive

More and more jurisdictions are only introducing new regulatory frameworks to protect consumer data, limiting enterprises in what data they can collect and where they can store it.
Nov 21, 2022 2 min read
5 Things You Can Do in Limited Budget to Improve Your Cybersecurity - GuptaDeepak.com
learning

5 things to improve cybersecurity for startup

As a startup, maintaining cybersecurity is difficult. You have a small team and a small budget, and you probably don't know much about cybersecurity. But there are a few things that you can do!
Nov 17, 2022 1 min read
Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?
privacy

Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?

Verifiable credentials ensure individuals have total control over their personal information and need to verify their data instead of providing it.
Nov 14, 2022 4 min read
5 things to keep cybersecurity in check
cybersecurity

5 things to keep cybersecurity in check

As a startup, how can you ensure cybersecurity and improve it?
Nov 9, 2022 1 min read
How To Develop A Product-First Culture In Your Organization
startup

How To Develop A Product-First Culture In Your Organization

The critical mission should be clear to create a product that customers will genuinely want, need, and love.
Nov 7, 2022 8 min read
Page 1 of 10 Older Posts →
Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher © 2023
  • LinkedIn
  • YouTube
  • Twitter
  • Instagram
  • Medium
Powered by Ghost