DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Curious about the future of data-driven systems? Join our Data Engineering roundtable and learn how to build scalable data platforms.

Data Engineering: The industry has come a long way from organizing unstructured data to adopting today's modern data pipelines. See how.

Threat Detection: Learn core practices for managing security risks and vulnerabilities in your organization — don't regret those threats!

Managing API integrations: Assess your use case and needs — plus learn patterns for the design, build, and maintenance of your integrations.

Avatar

Deepak Gupta

CTO at LoginRadius

Vancouver, CA

Joined Jul 2019

https://www.loginradius.com/

About

CTO and co-founder of LoginRadius, a rapidly-expanding Customer Identity Management provider. Dedicated to innovating LoginRadius' platform, I love playing fooseball and winning poker games!

Stats

Reputation: 534
Pageviews: 62.2K
Articles: 10
Comments: 0
  • Articles

Articles

article thumbnail
Unlocking Seamless Experiences: Embracing Passwordless Login for Effortless Customer Registration and Authentication
Passwordless authentication is rapidly gaining traction and holds unparalleled opportunities to revolutionize both user experience and security.
February 6, 2024
· 1,747 Views · 1 Like
article thumbnail
Beyond Captchas: Exploring the Advancements of AI in Modern Bot Mitigation
This article enacts the evolution of digital defense strategies- from conventional CAPTCHAs to cutting-edge identity verification.
December 15, 2023
· 3,042 Views · 2 Likes
article thumbnail
When To Boost Your Authentication Strategy: Signs for Security Enhancement
Businesses embarking on a digital transformation journey shouldn’t ignore the importance of a robust authentication strategy as a part of their growth strategy.
September 22, 2023
· 2,975 Views · 1 Like
article thumbnail
Navigating Resistance To Change in Digital Transformation: Insights for CIO Strategies
Resistance to change is evident while navigating your digital transformation journey. Here’s how CIOs can address issues about resistance.
August 30, 2023
· 3,206 Views · 3 Likes
article thumbnail
Simple Privacy Tweaks: Fast and Effective Methods To Secure Your Personal Information
Protect your personal information with quick and effective privacy adjustments for peace of mind and control over your data.
July 17, 2023
· 2,286 Views · 1 Like
article thumbnail
The Role of Identity Detection and Response (IDR) in Safeguarding Government Networks
Let’s understand how IDR is swiftly changing the cybersecurity landscape for the public sector and why government agencies must gear up for its adoption.
March 23, 2023
· 2,254 Views · 1 Like
article thumbnail
Are Industrial IoT Attacks Posing a Severe Threat to Businesses?
Industrial IoT is swiftly gaining adoption and offering a broadened horizon for businesses. How can businesses ensure robust security in the IoT landscape?
February 18, 2023
· 5,377 Views · 1 Like
article thumbnail
Top Authentication Trends to Watch Out for in 2023
Secure authentication is becoming the biggest priority for online businesses seeking to avoid these risks. Here are the top authentication trends.
January 30, 2023
· 2,737 Views · 1 Like
article thumbnail
How to Plant the Right Cybersecurity Seeds to Create Opportunities in IoT
This article explains how the latest security best practices offer opportunities in the IoT landscape within the limits of trust and reliability.
August 23, 2022
· 6,277 Views · 1 Like
article thumbnail
Fronton Botnet Attacks: Why Enterprises Should Worry
This article discusses the aspect of botnet attacks and why businesses should put their best efforts into minimizing the risk.
Updated June 8, 2022
· 5,444 Views · 1 Like

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: