Skip to content

Commit

Permalink
Merge pull request #2035 from LoginRadius/develop
Browse files Browse the repository at this point in the history
Develop
  • Loading branch information
kailashloginradius authored Dec 9, 2024
2 parents 5f243ca + 56e194b commit 876dbbe
Show file tree
Hide file tree
Showing 7 changed files with 7 additions and 35 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ For many years, the role of a CISO was a pretty lonely one. Since cybersecurity

There are a number of good reasons for this. Though most CISOs have built sophisticated systems to respond to security threats, the changing threat landscape means that threats are now appearing at almost every endpoint across an organization. This means that teams previously regarded as fairly well protected against attacks – think marketing and customer service teams – are becoming a popular and lucrative target for hackers.

In this new environment, CISOs need to foreground collaboration. It’s only by working with colleagues throughout your organization that you can hope to [respond to these multivalent threats](https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/). This was a point that LoginRadius’ CEO, Deepak Gupta, [recently made in an article for Forbes](https://www.forbes.com/sites/forbestechcouncil/2021/08/17/the-role-of-a-ciso-in-building-a-modern-cybersecurity-culture/?sh=1e54482725e3).
In this new environment, CISOs need to foreground collaboration. It’s only by working with colleagues throughout your organization that you can hope to [respond to these multivalent threats](https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/).

In this article, we’ll go a little further, and turn his recommendations into actionable steps.

Expand Down
3 changes: 2 additions & 1 deletion content/growth/loginradius-csr-activities/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,8 @@ At LoginRadius, we check all the boxes in the category with our sustainable and

## A Little Backdrop

LoginRadius is a leading cloud-based CIAM solution that empowers organizations to deliver a delightful consumer experience. The company was established in 2012 by Mr. Rakesh Soni and Mr. Deepak Gupta is headquartered in San Francisco with offices in Jaipur and Hyderabad, India.
LoginRadius is a leading cloud-based CIAM solution that empowers organizations to deliver a delightful consumer experience. The company was established in 2012 by Mr. Rakesh Soni and is headquartered in San Francisco with offices in Jaipur and Hyderabad, India.


The company offers customizable login interfaces, open-source SDKs, best-in-class data security products, and integrations with over 150 third-party applications. We are already loved by 3,000 businesses with 1.17 billion consumers worldwide and raised $17 million in Series A funding from Microsoft.

Expand Down
24 changes: 0 additions & 24 deletions content/identity/cloud-computing-security-challenges/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,26 +73,6 @@ In addition, we hold a Security Trust Assurance and Risk (STAR) certification is

![](Cloud-Security-Challenges-Today-V01.01_02-1024x621.jpg)

## Why is certification important?

Recently, on the [CSA Security Update podcast,](https://podcasts.apple.com/us/podcast/csa-star-case-study-guest-deepak-gupta-co-founder-cto/id1463409667?i=1000452799351) LoginRadius why STAR certification is so important. replied: 

"CSA STAR frameworks contain the best practices for any software service platform vendor. It combines all of the various compliances an organization needs (with a specific focus on) cloud providers."

In the podcast, Deepak went on to say that certification "provides a level of assurance and transparency, not only for our customers but for their end-users, as well."

Mr. Gupta also explained that since LoginRadius gets certifications, they are "setting the standards (so that) customers don't need to worry about security policies and frameworks." 

## How is certification conducted?

Certifications are conducted through strict third-party audits. These audits examine everything from the development of the LoginRadius Identity Platform to our data security management systems. For us to receive certification, we must first undergo annual audits and inspections, practice reviews, and many other organizational standards and assessments. 

Our certifications allow you to enjoy data security, along with time and cost savings from avoiding the development, installation, and auditing of your on-premises computing.

### <span style="color: #FF4500"> As Deepak puts it: "(It's not) just a certification; it's something that protects every single portion of this company and our customers." </span>

The podcast's host agreed. "That's a great approach that everyone needs to take to heart. It's about people and process, on top of technology—not just technology alone." 

## Why choose cloud computing? 

**Cost-effectiveness**
Expand Down Expand Up @@ -144,9 +124,5 @@ The Cloud Security Alliance is the world's leading organization dedicated to def

LoginRadius is a member, along with other experts in cloud security. Together, CSA members share up-to-date developments about the cloud computing environment. We recognize emerging security risks so that we can improve cloud security for everyone.

As mentioned earlier, one way that LoginRadius recently shares expertise with the CSA is through their podcast, [CSA Security Update](https://podcasts.apple.com/us/podcast/csa-star-case-study-guest-deepak-gupta-co-founder-cto/id1463409667?i=1000452799351). To hear Deepak's interview with them, visit the [CSA Security podcast on iTunes](https://podcasts.apple.com/us/podcast/csa-star-case-study-guest-deepak-gupta-co-founder-cto/id1463409667?i=1000452799351).

For more insights on cloud security or compliance, contact Deepak on [LinkedIn](https://ca.linkedin.com/in/dpgupta), [Twitter](https://twitter.com/dip_ak?lang=en), or email the CSA at [email protected].

[![book-a-demo-loginradius](image5.png)](https://www.loginradius.com/book-a-demo/)

8 changes: 2 additions & 6 deletions content/identity/digital-privacy-best-practices/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,15 +26,11 @@ As we move towards a more data-centric economy, C-suite execs have a lot on thei

Three security experts provide advice on the best privacy practices in 2020.

**1\. Deepak Gupta, Chief Technical Officer at LoginRadius**

"Today enterprises move their data through streaming pipelines. Keeping track of where the data ends up is as crucial as safeguarding the data itself," [Gupta points out](https://twitter.com/dip_ak?lang=en), continuing  "Modern data privacy laws like the GDPR and CCPA couldn't have come at a better time. This is what security operations teams needed at the moment—an unbiased wake-up call. “

**2\. David Kemp, Business Strategist with Micro Focus**
**1\. David Kemp, Business Strategist with Micro Focus**

"Looking at the year ahead, we will see a major drive from organizations to achieve data privacy compliance," Kemp says, "individuals will increasingly recognize their right to data privacy, and ability to hold businesses to account for negligence."

**3\. Kelvin Coleman, Executive Director at NCSA**
**2\. Kelvin Coleman, Executive Director at NCSA**

“With new privacy legislation going to affect this year, digital privacy couldn’t be a more timely opportunity for helping businesses and consumers understand the importance of respecting and protecting personal information,” said [Coleman](https://twitter.com/kcolemanncsa?lang=en).

Expand Down
2 changes: 0 additions & 2 deletions content/identity/what-is-digital-transformation/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -365,8 +365,6 @@ For example, if you are launching a new self-serve application, your inbound cal
We have caught a few digital transformation leaders in action as they offer valuable perspective and guidance.



* **[Deepak Gupta](https://www.linkedin.com/in/dpgupta), CTO at LoginRadius**: Digital transformation does not come easy. Leaders must become transformers of their enterprise culture and strike the right balance between short-term improvement and long-term value.
* **[Jim Swanson](https://www.linkedin.com/in/jimdswanson/), CIO at Johnson & Johnson**: We talk about automating operations, people, and new business models. You could have all those things – but if leadership and culture aren't at heart, it fails.
* **[Dion Hinchcliffe](https://www.linkedin.com/in/dhinchcliffe), VP at Constellation Research**: The top IT executives today must match the pace of change, fall behind, or lead the pack. That's the existential issue at stake, where bold action must be actively supported by out-of-the-box experimentation and pathfinding.
* **[Bryson Koehler](https://www.linkedin.com/in/brysonkoehler), CTO at Equifax**: If you look at the vast majority of startups, they're not starting with giant, shrink-wrapped software packages as their company's base. If you're trying to create innovation inside a large enterprise, you shouldn't start with it either. You're not here to run the mainframe anymore.
Expand Down
2 changes: 1 addition & 1 deletion src/components/seo.js
Original file line number Diff line number Diff line change
Expand Up @@ -107,7 +107,7 @@ const SEO = ({
<link rel="icon" href={withPrefix("/favicon.png")} />
<link
rel="canonical"
href={seo.canonial !== "null" ? seo.canonial : seo.url}
href={seo.canonial ? seo.canonial : seo.url}
/>
<meta http-equiv="content-language" content="en"></meta>
<meta name="description" content={seo.description} />
Expand Down
1 change: 1 addition & 0 deletions static/_redirects
Original file line number Diff line number Diff line change
Expand Up @@ -169,6 +169,7 @@
/169 /blog/169/#all-articles 301
/170 /blog/170/#all-articles 301
/171 /blog/171/#all-articles 301
/growth/ultimate-guide-to-professional-email-signatures-with-examples/ /blog/growth/ 301
/engineering/identity/digital-identity-management/blog/identity/digital-identity-management/ /blog/identity/digital-identity-management/ 301
/164/blog/164/#all-articles /blog/ 301
/engineering/identity/social-authentication/blog/identity/social-authentication/ /blog/identity/social-authentication/ 301
Expand Down

0 comments on commit 876dbbe

Please sign in to comment.