{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/64","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"From the loss of data to drastic sums of revenue, data breaches can severely handicap a company for a significant amount of time. However…","fields":{"slug":"/identity/data-breaches-common-mistakes/"},"html":"<p>From the loss of data to drastic sums of revenue, data breaches can severely handicap a company for a significant amount of time. However, given that a data breach prevention plan is not always foolproof, one question remains. </p>\n<p>How does a company effectively deal with a data breach to mitigate its effects? Let’s find out in this blog. </p>\n<h2 id=\"7-common-mistakes-that-companies-commit\" style=\"position:relative;\"><a href=\"#7-common-mistakes-that-companies-commit\" aria-label=\"7 common mistakes that companies commit permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Common Mistakes That Companies Commit</h2>\n<p>So it happened. The attack was successful, and there was a data breach—resulting in a large portion of the files being lost and the people behind the attack making their demands. </p>\n<p>The first order of business should be mapping out an incident response plan to restrict data loss at the minimum. The next challenge is implementing this plan. Many times, while doing so, companies make some common mistakes. </p>\n<p>It is time to delve into those mistakes and <a href=\"https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/\">figure out how you can prevent them</a> from happening if you fall victim to a data breach. </p>\n<h3 id=\"1-waiting-for-accurate-information\" style=\"position:relative;\"><a href=\"#1-waiting-for-accurate-information\" aria-label=\"1 waiting for accurate information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Waiting for accurate information.</h3>\n<p>In many cases, a cybersecurity team may look to wait for all the information they require to launch a successful mitigation or incident response plan. However, the actual aftermath of a data breach is very dynamic, where information is constantly changing due to the analysis being carried out by internal or external forensics teams. </p>\n<p>In actuality, companies must implement their response as soon as the threat or attack is detected. Any wait for accurate information will prove futile as it can lead to condensed timeframes making it impossible to tackle the attack effectively. </p>\n<h3 id=\"2-lack-of-communication\" style=\"position:relative;\"><a href=\"#2-lack-of-communication\" aria-label=\"2 lack of communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Lack of communication.</h3>\n<p>The communication between various members and departments in the company is of utmost importance post data breach. This is because, in order to manage the data breach properly, tasks need to be delegated quickly so that more ground can be covered. </p>\n<p>Therefore, with so many people working on managing a breach, there needs to be communication between them to piece together all the information they have attained. </p>\n<h3 id=\"3-no-practice-drills\" style=\"position:relative;\"><a href=\"#3-no-practice-drills\" aria-label=\"3 no practice drills permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. No practice drills.</h3>\n<p>A great way to determine all the necessary aspects of an incident response if a data breach occurs is to conduct drills. Not only will this test out the <a href=\"https://www.loginradius.com/blog/identity/data-security-best-practices/\">data breach prevention policies</a> and measures that are in place, but it also helps everyone involved to understand what their role is. </p>\n<p>Therefore, if these drills are carried out before an actual data breach, it may result in mayhem while the company tries to put up its defenses. </p>\n<h3 id=\"4-absence-of-leadership\" style=\"position:relative;\"><a href=\"#4-absence-of-leadership\" aria-label=\"4 absence of leadership permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Absence of leadership.</h3>\n<p>As mentioned before, the roles that each person and every team plays in handling a data breach are important. Therefore, it is also essential that a single person oversees the entire operation and is capable of making decisions. </p>\n<p>This leader will receive reports from every team involved in mitigating the attack and will, therefore, have to coordinate with every party involved. This person will have to be the voice of reason during this trying time and do everything in their power to ensure that the response plan is being implemented properly. </p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"RP-data-breach-report\"\n        title=\"RP-data-breach-report\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/RP-data-breach-report.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/RP-data-breach-report.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/RP-data-breach-report.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/RP-data-breach-report.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"5-no-third-party-agencies\" style=\"position:relative;\"><a href=\"#5-no-third-party-agencies\" aria-label=\"5 no third party agencies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. No third-party agencies.</h3>\n<p>There may be instances where a company will not be able to handle a data breach simply with in-house staff. Therefore, it is advisable to bring in external agencies that are more equipped to handle data breaches. In addition to this, these agencies also have more experience in mitigating such attacks meaning that the company may not lose a drastic amount of data. </p>\n<h3 id=\"6-absence-of-legal-counsel\" style=\"position:relative;\"><a href=\"#6-absence-of-legal-counsel\" aria-label=\"6 absence of legal counsel permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Absence of legal counsel.</h3>\n<p>Data attacks are accompanied by several legal implications like lawsuits from shareholders or even customers. For this reason, a company must bring in the required legal professionals to help with the implications. They will also be required to help dispense guidance from a legal standpoint early on after the data breach. </p>\n<h3 id=\"7-lack-of-remediation\" style=\"position:relative;\"><a href=\"#7-lack-of-remediation\" aria-label=\"7 lack of remediation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Lack of remediation.</h3>\n<p>One of the most important aspects of dealing with a data breach involves determining how it happened in the first place. Was it because of vulnerabilities in the security measures? Or was it a human error? </p>\n<p>Either way, the organization has to make it a point to analyze every aspect of the data breach and its handling and bring about the needed changes. Changes may be required in the security measures for data breach prevention or even handling it. </p>\n<p>According to several reports, a data breach typically costs an organization anywhere from<a href=\"https://www.ibm.com/security/data-breach\"> $3.86 million to $4.26 million</a>. In fact, in light of the current working norms, the prevalence of data breaches only seems to be increasing. </p>\n<p>However, learning from the above mistakes, an organization can remain defenseless in the face of a data breach.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 01, 2021","updated_date":null,"description":"With hacking events on the rise, it would be wise to take a step back and consider where things went wrong. You can prevent data breach occurrences in your organization by learning to recognize the common mistakes that are committed.","title":"Avoid these Common Mistakes When Dealing with Data Breaches","tags":["data security","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/d5ec2b4e2afedf0135fdf1833ddb300f/14b42/data-breaches-common-mistakes-cover.jpg","srcSet":"/static/d5ec2b4e2afedf0135fdf1833ddb300f/f836f/data-breaches-common-mistakes-cover.jpg 200w,\n/static/d5ec2b4e2afedf0135fdf1833ddb300f/2244e/data-breaches-common-mistakes-cover.jpg 400w,\n/static/d5ec2b4e2afedf0135fdf1833ddb300f/14b42/data-breaches-common-mistakes-cover.jpg 800w,\n/static/d5ec2b4e2afedf0135fdf1833ddb300f/16310/data-breaches-common-mistakes-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"You might have already participated in Hacktoberfest as a contributor. But what if you have a project that you want to open source and get…","fields":{"slug":"/engineering/hacktoberfest-participation-as-maintainer/"},"html":"<p>You might have already participated in Hacktoberfest as a contributor. But what if you have a project that you want to open source and get contributions during Hacktoberfest?</p>\n<p>Well, this guide covers everything you need to know:</p>\n<ul>\n<li>How to make your repo open source?</li>\n<li>How to get valuable contributions from the open source community?</li>\n<li>How to participate in Hacktoberfest as a maintainer?</li>\n</ul>\n<blockquote>\n<p>Most Important: The project should be in Working Condition or at both Logical and Coding End (if coding project). Here are the list of <a href=\"https://www.loginradius.com/open-source/\">OpenSource repos</a> by LoginRadius and the <a href=\"/hacktoberfest-2021/\">issues/guidelines</a> for contributers.</p>\n</blockquote>\n<p>If your project satisfies the above condition, you can just go ahead and implement the steps described as follows. By implementing these steps, you can successfully open source your project and get contributions for your open source project, especially during Hacktoberfest.</p>\n<h2 id=\"title\" style=\"position:relative;\"><a href=\"#title\" aria-label=\"title permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Title</h2>\n<p>Your project should have a concise title. This title will be the name of your project repo on GitHub.</p>\n<ul>\n<li>The title should be simple and easy to understand.</li>\n<li>No longer than 15 characters.</li>\n<li>Use a hyphen (-) to separate words, not pascal or camel casing. E.g., <strong>engineering-portal</strong></li>\n</ul>\n<h2 id=\"repository-description\" style=\"position:relative;\"><a href=\"#repository-description\" aria-label=\"repository description permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Repository Description</h2>\n<ul>\n<li>Each project must have a description of the project. The description should give a gist of the project and what the project does.</li>\n<li>The description should not be more than two lines.</li>\n</ul>\n<h2 id=\"topiclabels\" style=\"position:relative;\"><a href=\"#topiclabels\" aria-label=\"topiclabels permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Topic/Labels</h2>\n<p>As part of Hacktoberfest and to make it easy to find the project, the repository should have one or more of the following labels</p>\n<ul>\n<li>hacktoberfest (mandatory)</li>\n<li>The technology it’s using (golang, react, javascript, etc.)</li>\n<li>open-source </li>\n<li>contributions-welcome</li>\n<li>hacktoberfest2021</li>\n</ul>\n<h2 id=\"project-readme\" style=\"position:relative;\"><a href=\"#project-readme\" aria-label=\"project readme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Project README</h2>\n<p>Each project must have a README file.</p>\n<ul>\n<li>README should be in Markdown format (README.md)</li>\n<li>\n<p>README should have the following sections:</p>\n<ul>\n<li>Name of the project in h1 Heading at the top of your README.</li>\n<li>\n<p>A Table of Contents in which each item will link to the following headings:</p>\n<ul>\n<li>\n<p>Introduction to the project </p>\n<ul>\n<li>The introduction should start after the heading. </li>\n<li>The introduction should be well written and clarify what your project is doing and what it is about.</li>\n<li>You can also provide a Get Started heading, which should link to the How to Section (Installation).</li>\n</ul>\n</li>\n<li>Features (Optional): If you want to highlight any features, add a list here.</li>\n<li>\n<p>How to install and run the project (h2 Heading: Installation)</p>\n<ul>\n<li>This section should clearly describe how someone can run the project locally and if it requires any installations — e.g., <code>npm i</code> for node projects.</li>\n<li>Add any extra information like creating a .env file or anything needed to run the application locally.</li>\n</ul>\n</li>\n<li>If it’s a library or utility that the user can directly access or use, add an API or Usage section providing a code snippet.</li>\n<li>\n<p>How to Contribute section (h2 Contributing)\t</p>\n<ul>\n<li>\n<p>Section 1 with a link to the open issues tab. </p>\n<ul>\n<li>If you want to contribute, please check the open issues (link of the issues).</li>\n</ul>\n</li>\n<li>\n<p>Section 2 with a link to CONTRIBUTING.md. <a href=\"https://github.com/LoginRadius/business-email-validator/blob/master/CONTRIBUTING.md\">Sample</a> here.</p>\n<ul>\n<li>LICENSE: Mention the license of your project. <a href=\"https://github.com/LoginRadius/engineering-portal#license\">Sample</a> here.</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n<h2 id=\"contributingmd\" style=\"position:relative;\"><a href=\"#contributingmd\" aria-label=\"contributingmd permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CONTRIBUTING.MD</h2>\n<p>It should have instructions on how to contribute to the project. Contributions guidelines should have at least three different sections.</p>\n<ul>\n<li>\n<p>Guidelines on Reporting New Issues</p>\n<ul>\n<li>Title and description of the issue.</li>\n<li>Useful tags, if any.</li>\n<li>Steps required to reproduce the issue, if applicable.</li>\n<li>You can also mention an issue template here if required. Issue and PR Templates <a href=\"https://docs.github.com/en/communities/using-templates-to-encourage-useful-issues-and-pull-requests/about-issue-and-pull-request-templates\">here</a>.</li>\n</ul>\n</li>\n<li>\n<p>Submitting PRs</p>\n<ul>\n<li>How to submit a PR? — e.g., details on what changed, what was removed, any action items needed before submitting a PR like running tests, etc.</li>\n<li>You can add a <code>PULL_REQUEST_TEMPLATE.md</code> in the project root to automatically populate templated content while creating a PR.</li>\n</ul>\n</li>\n<li>\n<p>Commit Message Format</p>\n<ul>\n<li>You can add an optional commit message format to maintain commit consistency. Recommended <a href=\"https://github.com/LoginRadius/business-email-validator/blob/master/CONTRIBUTING.md#commit-messages\">Commit Message Format</a> here.</li>\n</ul>\n</li>\n</ul>\n<h2 id=\"license\" style=\"position:relative;\"><a href=\"#license\" aria-label=\"license permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>License</h2>\n<p>Choose an appropriate open source license for your project</p>\n<p>MIT license is one of the <a href=\"https://opensource.org/licenses\">popular open source licenses</a> used by many open source projects on GitHub. <a href=\"https://opensource.org/licenses\">Click here</a> to know more about open source licenses and choose the license most appropriate for your project.</p>\n<h2 id=\"issues-in-repos\" style=\"position:relative;\"><a href=\"#issues-in-repos\" aria-label=\"issues in repos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Issues in Repos</h2>\n<p>Each repo should have at least 5-10 well-labeled issues to be considered for Hacktoberfest.</p>\n<ul>\n<li>\n<p>Following are the different issue types:</p>\n<ul>\n<li>hacktoberfest (mandatory)</li>\n<li>good-first-contribution</li>\n<li>good-first-issue</li>\n<li>exp/beginner</li>\n<li>help-wanted</li>\n<li>kind/docs</li>\n<li>kind/enhancement</li>\n<li>up-for-grabs</li>\n</ul>\n</li>\n<li>For more information about managing issues with labels, follow these <a href=\"https://docs.github.com/en/issues/using-labels-and-milestones-to-track-work/managing-labels\">GitHub guidelines</a></li>\n</ul>\n<p>As a maintainer, you could also be eligible to win swag from DigitalOcean for participating in Hacktoberfest. For more information, <a href=\"https://hacktoberfest.digitalocean.com/resources/maintainers\">click here</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 28, 2021","updated_date":null,"description":"This ultimate guide is the resource you need to open source your project and participate in Hacktoberfest to get valuable contributions from the community.","title":"How to Participate in Hacktoberfest as a Maintainer","tags":["Hacktoberfest","Hacktoberfest 2021","Open Source"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/9b4d9cbebcded6e980c32d1f168669e4/ee604/cover.png","srcSet":"/static/9b4d9cbebcded6e980c32d1f168669e4/69585/cover.png 200w,\n/static/9b4d9cbebcded6e980c32d1f168669e4/497c6/cover.png 400w,\n/static/9b4d9cbebcded6e980c32d1f168669e4/ee604/cover.png 800w,\n/static/9b4d9cbebcded6e980c32d1f168669e4/f3583/cover.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Narendra Pareek","github":"pareek-narendra","avatar":null}}}},{"node":{"excerpt":"Tiroler Tageszeitung (TT) has been a leading Tyrolean medium daily newspaper committed to regional quality journalism for over 75 years. The…","fields":{"slug":"/identity/tiroler-loginradius-customer-success-story/"},"html":"<p>Tiroler Tageszeitung (TT) has been a leading Tyrolean medium daily newspaper committed to regional quality journalism for over 75 years. The company was on a hunt for the right onboarding solution that not only offers secure authentication but eventually delivers a flawless user experience. </p>\n<p>Here we’re sharing the success story of Tiroler Tageszeitung and how LoginRadius helped them overcome diverse challenges. </p>\n<h2 id=\"the-situation\" style=\"position:relative;\"><a href=\"#the-situation\" aria-label=\"the situation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Situation</h2>\n<p>TT was trying to manage their registration and access infrastructure in-house, which was a catch-22 situation. Hence they decided to hand over authentication to a professional who can get the job done efficiently. </p>\n<h2 id=\"the-challenges\" style=\"position:relative;\"><a href=\"#the-challenges\" aria-label=\"the challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Challenges</h2>\n<p>TT had been experiencing the following list of challenges. Therefore, they wanted a secure, stable, reliable solution that made onboarding seamless for their consumers. </p>\n<ul>\n<li>Poor user onboarding and user experience</li>\n<li>Lack of robust authentication mechanism </li>\n<li>The immediate need for the scalable and secure hosting environment</li>\n<li>Unable to access data from any location </li>\n</ul>\n<p>TT decided on a transition to cloud storage and, therefore, approached LoginRadius expecting a scalable hosting environment, among other cloud-centric benefits. </p>\n<h2 id=\"how-loginradius-paved-the-path-for-a-seamless-onboarding-and-secure-experience\" style=\"position:relative;\"><a href=\"#how-loginradius-paved-the-path-for-a-seamless-onboarding-and-secure-experience\" aria-label=\"how loginradius paved the path for a seamless onboarding and secure experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Paved the Path for a Seamless Onboarding and Secure Experience</h2>\n<h3 id=\"registration-as-a-service-raas\" style=\"position:relative;\"><a href=\"#registration-as-a-service-raas\" aria-label=\"registration as a service raas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Registration as a Service (RaaS)</h3>\n<p>The company wanted a seamless experience delivered to every user while they interact with them online. LoginRadius helped them implement a fully managed and <a href=\"https://www.loginradius.com/authentication/\">personalized registration</a> on their portal that now has a seamless experience. </p>\n<h3 id=\"social-sharing-and-account-linking\" style=\"position:relative;\"><a href=\"#social-sharing-and-account-linking\" aria-label=\"social sharing and account linking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Sharing and Account Linking</h3>\n<p>We added social sharing widgets in the platform that helps our client connect with different users, groups, and communities through their social media channels. We also enabled short URL sharing and auto-linking of multiple social accounts based on email addresses. </p>\n<h3 id=\"single-sign-on\" style=\"position:relative;\"><a href=\"#single-sign-on\" aria-label=\"single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single Sign-On</h3>\n<p>We understand that our clients’ users may find it difficult to use multiple credentials for logging in to their accounts. Hence, we unified their consumer journey through <a href=\"https://www.loginradius.com/single-sign-on/\">SSO</a> into their systems. This helped users to use their key (set of login credentials) for accessing multiple web properties.</p>\n<h3 id=\"webhooks-and-data-migration\" style=\"position:relative;\"><a href=\"#webhooks-and-data-migration\" aria-label=\"webhooks and data migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Webhooks and Data Migration</h3>\n<p>Our client wanted to migrate their existing consumer data to LoginRadius CIAM. Hence we implemented a seamless and smooth transition to meet their demand. We ensured TT could quickly and effortlessly configure webhooks for multiple events using our APIs. </p>\n<h3 id=\"a-comprehensive-view-of-consumers\" style=\"position:relative;\"><a href=\"#a-comprehensive-view-of-consumers\" aria-label=\"a comprehensive view of consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Comprehensive View of Consumers</h3>\n<p>TT demanded a 360--degree view of its consumers, and our User Management Dashboard helped them manage and view multiple consumers without any hassle. Moreover, we ensured they could easily personalize the data fields, filter data points, and export entire data into CSV format for greater convenience. </p>\n<h3 id=\"social-analytics-and-reporting\" style=\"position:relative;\"><a href=\"#social-analytics-and-reporting\" aria-label=\"social analytics and reporting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Analytics and Reporting</h3>\n<p>One of the most critical differentiators for TT was LoginRadius’s ability to provide a highly personalized solution based on consumer expectations. To achieve that, we helped TT churn analytics based on social parameters, demographics, login analytics, user activities, and more.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> understands that modern businesses require cutting-edge technology to deliver a unified and seamless user experience that fosters growth. Our client, Tiroler Tageszeitung (TT), was hunting for a modern and secure solution to meet their smooth and fast onboarding demands. </p>\n<p>With our state-of-the-art technology, we were able to help the company increase its user base through great user experience coupled with security and convenience. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310-1.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/BD-Plexicon1-1024x310-1.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310-1.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/BD-Plexicon1-1024x310-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 28, 2021","updated_date":null,"description":"Read the success story of how LoginRadius helped Tiroler Tageszeitung increase their user base, provide low downtime, and ensure high scalability, among other diverse challenges.","title":"Tiroler Tageszeitung (TT), a LoginRadius Customer Success Story","tags":["media-and-publication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/9b1d951d8f2690faf889253614617643/14b42/tiroler-loginradius-customer-success-story-cover.jpg","srcSet":"/static/9b1d951d8f2690faf889253614617643/f836f/tiroler-loginradius-customer-success-story-cover.jpg 200w,\n/static/9b1d951d8f2690faf889253614617643/2244e/tiroler-loginradius-customer-success-story-cover.jpg 400w,\n/static/9b1d951d8f2690faf889253614617643/14b42/tiroler-loginradius-customer-success-story-cover.jpg 800w,\n/static/9b1d951d8f2690faf889253614617643/16310/tiroler-loginradius-customer-success-story-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"excerpt":"For many years, the role of a CISO was a pretty lonely one. Since cybersecurity was seen as an arcane, obtuse subject, other executives were…","fields":{"slug":"/growth/how-ciso-can-improve-collaboration-on-security-risks/"},"html":"<p>For many years, the role of a CISO was a pretty lonely one. Since cybersecurity was seen as an arcane, obtuse subject, other executives were largely content to leave responsibility for it up to a dedicated member of the executive team. Now, this approach is changing.</p>\n<p>There are a number of good reasons for this. Though most CISOs have built sophisticated systems to respond to security threats, the changing threat landscape means that threats are now appearing at almost every endpoint across an organization. This means that teams previously regarded as fairly well protected against attacks – think marketing and customer service teams – are becoming a popular and lucrative target for hackers.</p>\n<p>In this new environment, CISOs need to foreground collaboration. It’s only by working with colleagues throughout your organization that you can hope to <a href=\"https://www.loginradius.com/blog/identity/5-ways-to-handle-a-data-breach/\">respond to these multivalent threats</a>.</p>\n<p>In this article, we’ll go a little further, and turn his recommendations into actionable steps.</p>\n<h2 id=\"collaboration-and-security\" style=\"position:relative;\"><a href=\"#collaboration-and-security\" aria-label=\"collaboration and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Collaboration and Security</h2>\n<p>First, a word about the value of collaboration, and its limitations. It’s now well established that intelligent collaboration within an organization can <a href=\"https://restoreprivacy.com/cyber-security-statistics-2020/\">help to improve cyber security</a>. Even a process as simple as offering training to staff outside the IT department can dramatically improve cyber resilience, for instance, as can sharing risk identification systems across departments.</p>\n<p>However, the structure of many organizations makes it easy for this collaboration to backfire. Specifically, it is possible for teams to share so many systems, and so much information, critical systems are left exposed. This can happen not just within an organization, but also with its <a href=\"https://www.financestrategists.com/finance-terms/b2b\">B2B partners</a>, whose systems are now typically integrated with those of suppliers and customers.</p>\n<p>In other words, collaboration can be a powerful defensive technique, but only if it is used carefully, and within a structured framework. Here’s how to do that.</p>\n<h3 id=\"1-collaborate-earlier\" style=\"position:relative;\"><a href=\"#1-collaborate-earlier\" aria-label=\"1 collaborate earlier permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Collaborate Earlier</h3>\n<p>One crucial consideration when looking to integrate the role of a CISO into your broader organization is when to start the collaborative process. It’s not practical to appraise every executive of every upcoming IT initiative, but too often these initiatives are not mentioned to leaders until it is too late to <a href=\"https://www.loginradius.com/blog/identity/7-web-app-sec-threats/\">mitigate their business risks</a>.</p>\n<p>This is why Federal Reserve CISO Devon Bryan told the <a href=\"https://www.scworld.com/news/the-art-of-aligning-security-goals-with-business-goals\">Management Information Systems Training Institute (MISTI)</a> that today’s security leaders need to “prioritize partnerships with business units” immediately. By doing so, CISOs can start to build a cooperative environment in the boardroom and make sure that business leaders understand how new technologies will affect their areas of expertise.</p>\n<h3 id=\"2-create-shared-definitions\" style=\"position:relative;\"><a href=\"#2-create-shared-definitions\" aria-label=\"2 create shared definitions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Create Shared Definitions</h3>\n<p>The basis of effective collaboration is communication, and the basis of effective communication is making sure that everyone is working with the same definitions. This can be approached in a formal way – building a shared taxonomy using definitions from the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO).  </p>\n<p>Alternatively, it can be approached in a more ad-hoc fashion, in which a CISO takes care to explain cybersecurity terms to their colleagues, and in turn, makes sure they understand the nomenclature of business operations.</p>\n<p>If done correctly, this process is also an important part of building a cybersecurity culture within your organization. If everyone knows how to refer to cybersecurity risks, they are better able to communicate about them.</p>\n<h3 id=\"3-unify-metrics\" style=\"position:relative;\"><a href=\"#3-unify-metrics\" aria-label=\"3 unify metrics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Unify Metrics</h3>\n<p>To take collaboration one step further, CISOs can even consider building a shared set of metrics that can be used across an organization. These metrics should be developed in consultation with other executives so that their relevance to broader business priorities is clear. In fact, if done carefully, this process can be a powerful tool that allows CISOs to explain the relevance and monetary value of their work to the other members of the C suite.</p>\n<p>That said, CISOs should also take care not to burden themselves with complex KPIs. The metrics used to measure cybersecurity at an executive level do not need to be the same as those that are used internally within the cybersecurity team. Care should be taken to ensure that they are relatively easy to measure, understand, and track.</p>\n<h3 id=\"4-share-skills\" style=\"position:relative;\"><a href=\"#4-share-skills\" aria-label=\"4 share skills permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Share Skills</h3>\n<p>Effective CISOs are those that encourage their team to share their skills with the broader organization. Sharing skills can either be done in an informal way – by making sure there is a member of the security team on teams charged with developing new products, for example. But skill sharing can also be formalized, through designing a training process for staff outside your team to get up to speed on how to <a href=\"https://www.loginradius.com/blog/identity/data-security-best-practices/\">protect their own teams</a> from security threats.</p>\n<h3 id=\"5-lean-on-technology\" style=\"position:relative;\"><a href=\"#5-lean-on-technology\" aria-label=\"5 lean on technology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lean on Technology</h3>\n<p>Finally, make sure you are using the technology available to you in order to share information and insight across all the teams in your organization. A comprehensive security incident and event management (SIEM) can greatly improve network visibility, but also allow you to share real-time, actionable insights with teams that may be opening themselves up to attack.</p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Credential-stuffing\"\n        title=\"WP-Credential-stuffing\"\n        src=\"/static/b3baaddebefb0cbc65bd1297d10b82fd/e5715/WP-Credential-stuffing.png\"\n        srcset=\"/static/b3baaddebefb0cbc65bd1297d10b82fd/a6d36/WP-Credential-stuffing.png 650w,\n/static/b3baaddebefb0cbc65bd1297d10b82fd/e5715/WP-Credential-stuffing.png 768w,\n/static/b3baaddebefb0cbc65bd1297d10b82fd/81501/WP-Credential-stuffing.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a>  </p>\n<p>And, over time, it’s possible to leverage the power of big data to pull the insights drawn from your SIEM into a holistic picture of cybersecurity across your organization. By tracking the types of threats that you are exposed to, and their relative success, you can begin to plan a cybersecurity strategy that reduces your future vulnerability.</p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>Ultimately, collaboration is a necessary part of the contemporary business environment. The days when CISOs worked within a hermetically sealed team are long gone – today, CISOs must be as engaged with business processes and risks as any other member of the C suite.</p>\n<p>Building collaborative ways of working is not a quick process, but it can be done. And just as we’ve seen the evolutionary development of cyber security over the past few years, now we are witnessing the evolution of the business environment itself.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 27, 2021","updated_date":null,"description":"It no longer makes sense to think of security as a single system, because there are so many different layers, and so many different points of entry. This blog explains how  CISOs can respond to these multivalent threats across an organization.","title":"How CISOs Can Improve Collaboration on Security Risks","tags":["data security","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/d49f67666953e0fcf57812e8cca2710c/14b42/ciso-cover-image.jpg","srcSet":"/static/d49f67666953e0fcf57812e8cca2710c/f836f/ciso-cover-image.jpg 200w,\n/static/d49f67666953e0fcf57812e8cca2710c/2244e/ciso-cover-image.jpg 400w,\n/static/d49f67666953e0fcf57812e8cca2710c/14b42/ciso-cover-image.jpg 800w,\n/static/d49f67666953e0fcf57812e8cca2710c/16310/ciso-cover-image.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shivangini Yadav","github":null,"avatar":null}}}},{"node":{"excerpt":"What is Hacktoberfest 2021? Hacktoberfest 2021 is the 8th edition of Hacktoberfest hosted by DigitalOcean. It is an open source festival…","fields":{"slug":"/engineering/hacktoberfest-2021/"},"html":"<h2 id=\"what-is-hacktoberfest-2021\" style=\"position:relative;\"><a href=\"#what-is-hacktoberfest-2021\" aria-label=\"what is hacktoberfest 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Hacktoberfest 2021?</h2>\n<p><a href=\"https://hacktoberfest.digitalocean.com/\">Hacktoberfest 2021</a> is the 8th edition of Hacktoberfest hosted by <a href=\"https://www.digitalocean.com/\">DigitalOcean</a>. It is an open source festival celebrated during October every year, encouraging people worldwide to actively participate and contribute to participating open source projects hosted across GitHub and GitLab.</p>\n<p>In fact, Hacktoberfest 2020 had attracted 169,886 participants and 116,361 participating open source repositories, representing 135 countries.</p>\n<p>You can simply <a href=\"https://hacktoberfest.digitalocean.com/\">register yourself here</a> and start contributing to any participating open source project from Oct 01 - Oct 31. And if you meet the <a href=\"https://hacktoberfest.digitalocean.com/resources/participation\">contribution criteria</a> set by DigitalOcean, you’ll receive a Hacktoberfest t-shirt from DigitalOcean!</p>\n<p>Additionally, if you make successful contributions to <a href=\"https://github.com/LoginRadius\">LoginRadius open source projects</a>, you’ll separately receive a LoginRadius branded Hacktoberfest t-shirt from us, recognizing and thanking you for your valuable contributions.</p>\n<h2 id=\"why-contribute-to-loginradius-open-source-projects\" style=\"position:relative;\"><a href=\"#why-contribute-to-loginradius-open-source-projects\" aria-label=\"why contribute to loginradius open source projects permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Contribute to LoginRadius Open Source Projects?</h2>\n<p>LoginRadius is an industry-leading Customer Identity and Access Management (CIAM) provider with a mission to secure every identity on this planet.</p>\n<p>At LoginRadius, we’re committed to making our cloud platform more accessible for developers across tech stacks, so they can quickly implement user registration and authentication processes in their applications and become more efficient at focusing on core business features.</p>\n<p>We’ve always loved open source and the many great things it has done for the software development community and businesses. This inspired us to open source many of our projects, including SDKs, LR CLI, and Async Blog, a leading publication for developers by developers.</p>\n<p>Through our open source projects, we actively collaborate with the developer community and drive change and innovation for the optimistic progress of everyone.</p>\n<p>When you contribute to our open source projects, you’re helping the whole developer community become efficient, productive, and helping them manage user identities and authentication on their applications securely and scalably.</p>\n<h2 id=\"how-to-contribute\" style=\"position:relative;\"><a href=\"#how-to-contribute\" aria-label=\"how to contribute permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Contribute?</h2>\n<p>The exciting part about being involved in the open source community is that no matter how small or big your contributions are, the community will welcome your efforts and collaborate with you positively, sharing feedback and expressing gratitude.</p>\n<p>Especially with <a href=\"https://github.com/LoginRadius\">LoginRadius open source projects</a>, your contributions can make a big difference! We also try making your collaboration with us more enjoyable.</p>\n<p>Please note that only contributions that add significant value to our projects will be eligible for swag. This will be at our sole discretion. But you may go ahead and contribute in any way you would like.</p>\n<h3 id=\"prerequisites\" style=\"position:relative;\"><a href=\"#prerequisites\" aria-label=\"prerequisites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prerequisites</h3>\n<p>You should have a basic to intermediate understanding of the following:</p>\n<ul>\n<li>Git</li>\n<li>GitHub</li>\n<li>Forking a repository</li>\n<li>Creating a pull request</li>\n</ul>\n<h3 id=\"repositories-for-contributing\" style=\"position:relative;\"><a href=\"#repositories-for-contributing\" aria-label=\"repositories for contributing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Repositories for Contributing</h3>\n<p>Each of the following public repositories on GitHub will have a list of issues listed. You can choose to work on these issues based on your skills and expertise in solving them.</p>\n<p>At LoginRadius, we value your contributions and proactively collaborate with you to get your contribution accepted. </p>\n<p>But one thing to keep in mind is that we don’t tolerate spamming. </p>\n<p>So, what is spamming?</p>\n<p>Spamming is creating a pull request for the sake of it and not adding value in any way. We’ll identify spam pull requests and report them according to GitHub guidelines.</p>\n<p>Anyways, you don’t have to worry about spamming accidentally: it seldom occurs without a clear intention. If we identify something as spam, we’ll let you know and help you understand why it is marked as spam.</p>\n<p>You can also easily find issues with the <strong>hacktoberfest</strong> label in order to know which repositories are seeking contributions. Or, you can simply <a href=\"https://www.google.com/url?q=https://github.com/search?q%3Dorg%253ALoginRadius%2Blabel%253Ahacktoberfest%2Btype%253Aissue&#x26;sa=D&#x26;source=editors&#x26;ust=1632394834688000&#x26;usg=AOvVaw0wYGvdlJspvM887yP750Ms\">click here</a> to find all the issues needing contribution.</p>\n<p>That all being out of the way, here are the open source projects for which we’re seeking your valuable contributions:</p>\n<ul>\n<li>\n<p><strong><a href=\"https://github.com/LoginRadius/lr-cli\">LoginRadius CLI</a>:</strong> We understand that developers love the simplicity and efficiency offered by CLI. So, we recently launched CLI for LoginRadius, which helps implement and manage LoginRadius CIAM faster than ever.</p>\n<p>As our CLI still has room for becoming great, we seek your contributions in any way possible to make it better and help developers become more productive.</p>\n</li>\n<li>\n<p><strong><a href=\"https://github.com/LoginRadius/engineering-portal\">Async Blog</a>:</strong> This is our open source blog created for developers by developers. If you’ve expertise in solving issues and fixing errors, please come forward and share your expertise with the world.</p>\n<p>We have a few issues created for this repository based on our research about what problems developers are currently facing and trying to solve them. Share your expertise, write a blog, and be a holding hand for developers in need!</p>\n</li>\n<li><strong><a href=\"https://github.com/LoginRadius/docs\">LoginRadius Docs</a>:</strong> This is an extensive resource for developers and engineers for understanding LoginRadius and implementing it. Though this project is mature, as we keep on bringing innovations and features, we need developers who are already familiar with LoginRadius to embed their unique expertise and view on LoginRadius in our docs.</li>\n<li><strong><a href=\"https://github.com/LoginRadius/idx-auto-tester\">IDX Auto Tester</a>:</strong> This is LoginRadius Identity Experience Automation Framework, which includes automation scripts written in Nightwatch.js and Node.js Core Assertion Testing Library for assertions. If you’re a Nightwatch.js geek, this is the project for you to flex your coding muscles!</li>\n<li><strong><a href=\"https://github.com/LoginRadius/awesome-test-cases-collection\">Awesome Test Cases Collection</a>:</strong> This repository includes basic checks needed to verify various features of LoginRadius. If you’re a tester and already familiar with LoginRadius and its features, this is the project you can contribute to.</li>\n<li><strong><a href=\"https://github.com/LoginRadius/go-saml\">Go SAML</a>:</strong> This is a SAMl 2.0 implementation in Go for implementing single sign-on (SSO) using LoginRadius. This also allows you to integrate identity providers like Google, Facebook, and Twitter on your applications. Contribute to this project to make SSO much more accessible for developers. </li>\n<li><strong><a href=\"https://github.com/LoginRadius/business-email-validator\">Business Email Validator</a>:</strong> This project focuses on only allowing business email domains for signups. You can simply improve this project by adding more public email domains and ensuring that no private domain is accidentally added to this list.</li>\n<li><strong><a href=\"https://github.com/LoginRadius/egnature\">Egnature</a>:</strong> This is a free and open source email signature generator. Contribute to this project, so anyone can easily set up their own email signature generator for their employees or community members.</li>\n<li><strong><a href=\"https://github.com/LoginRadius/ps-softlist\">PS Softlist</a>:</strong> This project offers a PowerShell script that helps you validate software installed on a Windows machine against a whitelist you create. This helps to perform software audits and generate relevant reports where compliance is essential. If you breathe PowerShell day in and day out, this is the project you can make a remarkable contribution to.</li>\n</ul>\n<p>Please note that each project will have specific guidelines on how to contribute in general and raise pull requests. Also, each project will have issues listed that you can pick and work on.</p>\n<p>If you’re facing any issues with locally running a project or something else, please feel free to raise an issue for the project. Our team will help you out.</p>\n<h2 id=\"win-loginradius-branded-swag\" style=\"position:relative;\"><a href=\"#win-loginradius-branded-swag\" aria-label=\"win loginradius branded swag permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Win LoginRadius Branded Swag</h2>\n<p>By actively participating in Hacktoberfest, you make the open source community more sustainable, and, in turn, this makes you feel at home. Empowering one another is what best depicts the open source philosophy and is a reward in itself.</p>\n<p>However, we want to make it more fun by sending cool t-shirts to all the accepted/eligible contributors. Just make sure to <a href=\"https://www.google.com/url?q=https://forms.gle/qhG6Sf8qrBznRrtQA&#x26;sa=D&#x26;source=editors&#x26;ust=1632314038203000&#x26;usg=AOvVaw3cOv-eOBvxNTaIS9j484fK\">fill this form</a> after you raise a pull request.</p>\n<p>Don’t forget that your contributions to our projects also count towards your overall Hacktoberfest contributions calculated by DigitalOcean — and if you’re eligible, they’ll send you another t-shirt as well.</p>\n<p>Let’s have fun with Hacktoberfest 2021!</p>\n<p><img src=\"https://media2.giphy.com/media/3oEjHKiDeYrKnjwGFq/giphy.gif\" alt=\"fun\"></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 23, 2021","updated_date":null,"description":"At LoginRadius, we're excited to celebrate Hacktoberfest 2021. Contribute to our open source projects and win cool LoginRadius branded swag to show off!","title":"Hacktoberfest 2021: Contribute and Win Swag from LoginRadius","tags":["Hacktoberfest","Open Source","LoginRadius"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a973ce89b99f360855681cd2a587531e/ee604/Hacktoberfest-2021.png","srcSet":"/static/a973ce89b99f360855681cd2a587531e/69585/Hacktoberfest-2021.png 200w,\n/static/a973ce89b99f360855681cd2a587531e/497c6/Hacktoberfest-2021.png 400w,\n/static/a973ce89b99f360855681cd2a587531e/ee604/Hacktoberfest-2021.png 800w,\n/static/a973ce89b99f360855681cd2a587531e/f3583/Hacktoberfest-2021.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Raghunath Reddy","github":"raghunath-r-a","avatar":null}}}},{"node":{"excerpt":"We’re living in a digital era where we’re continuously surrounded by several cyber threats that may have a severe impact on our personal and…","fields":{"slug":"/identity/what-are-security-keys/"},"html":"<p>We’re living in a digital era where we’re continuously surrounded by several cyber threats that may have a severe impact on our personal and professional lives.  </p>\n<p>Whether we talk about the rising number of identity thefts or compromised sensitive information, individuals and organizations must quickly put their best foot forward to mitigate the risk. </p>\n<p>However, adding stringent layers of security through diverse practices, including <a href=\"https://www.loginradius.com/blog/engineering/why-mfa-important/\">multi-factor authentication</a> (MFA), has proven to be fruitful in minimizing the risks. </p>\n<p>These security practices add an extra security layer other than passwords and ensure that the right person has access to the right information. </p>\n<p>When it comes to robust security for a seamless authentication and authorization experience, security keys are considered one of the best ways to prove one’s identity. </p>\n<p>This post reveals all the aspects associated with a physical security key and helps you understand its advantages. </p>\n<h2 id=\"what-is-a-security-key\" style=\"position:relative;\"><a href=\"#what-is-a-security-key\" aria-label=\"what is a security key permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Security Key?</h2>\n<p>A security key is a physical USB drive that connects with your devices, including computers and laptops, to prove identity to access specific resources on a network. </p>\n<p>These kinds of keys can be connected to devices via USB, Bluetooth connection, or a USB-C port and are super simple to use whenever you need to go through an additional identity verification process. </p>\n<p>Just like the conventional OTPs and email verification, security keys can be used to authenticate a user whenever they wish to access specific resources or need to log in to their accounts on a website or an application. </p>\n<p>Several organizations encourage their employees to leverage a security key whenever they’re working on sensitive data or logging from a remote location. </p>\n<h2 id=\"advantages-of-using-a-security-key\" style=\"position:relative;\"><a href=\"#advantages-of-using-a-security-key\" aria-label=\"advantages of using a security key permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Using a Security Key</h2>\n<p>Besides offering multi-factor authentication for seamless and secure access management and log-in, security keys offer a number of advantages. Here’s the list: </p>\n<h3 id=\"easy-of-access\" style=\"position:relative;\"><a href=\"#easy-of-access\" aria-label=\"easy of access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Easy of Access</h3>\n<p>One of the significant advantages of using a physical security key is the ease of access. Since a security key is compact and can be easily carried, they offer a frictionless authentication experience. </p>\n<p>Users can carry them in their purses or wallet and can even attach the same with their keyrings. It’s a ready-to-use plug-and-play device. </p>\n<h3 id=\"phishing-proof\" style=\"position:relative;\"><a href=\"#phishing-proof\" aria-label=\"phishing proof permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phishing-Proof</h3>\n<p>These keys need to be registered to a website, which helps them mitigate the chances of phishing that further helps to eliminate any possibility of a data breach. </p>\n<p>Security key leverages FIDO’s U2F (Universal Second Factor) protocol that helps prevent users from accidentally falling victim to any phishing attacks. It only authenticates and authorizes users on the correct domain even if they mistakenly register the key on the wrong website. </p>\n<p>Since the actual user carries the device, chances of misuse of any security token or even a one-time password (OTP) are negligible. Hence it’s pretty safe to rely on security keys. </p>\n<h3 id=\"one-key-serves-multiple-purposes\" style=\"position:relative;\"><a href=\"#one-key-serves-multiple-purposes\" aria-label=\"one key serves multiple purposes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>One Key Serves Multiple Purposes</h3>\n<p>Another significant advantage of a physical security key is that it can be used for <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">Single Sign-On</a> (SSO), Multi-Factor Authentication (MFA), and sometimes even support FIDO authentication standards, including Universal Second Factor (U2F). </p>\n<p>Many organizations utilize security keys and eventually encourage their employees to use them as they have to deal with sensitive information regarding business and clients. This information, if leaked, may lead to specific financial and reputation consequences for the organization. </p>\n<h2 id=\"the-disadvantage-of-security-key\" style=\"position:relative;\"><a href=\"#the-disadvantage-of-security-key\" aria-label=\"the disadvantage of security key permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Disadvantage of Security Key</h2>\n<p>Besides the endless advantages of security keys regarding <a href=\"https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/\">authentication and authorization</a>, the major drawback is that these keys are costly. </p>\n<p><a href=\"https://www.loginradius.com/resource/a-quick-guide-to-authentication-authorization-and-encryption/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-auth\"\n        title=\"GD-to-auth\"\n        src=\"/static/6739a038a5fc3c81f0c0ae2e5c706118/e5715/GD-to-auth.png\"\n        srcset=\"/static/6739a038a5fc3c81f0c0ae2e5c706118/a6d36/GD-to-auth.png 650w,\n/static/6739a038a5fc3c81f0c0ae2e5c706118/e5715/GD-to-auth.png 768w,\n/static/6739a038a5fc3c81f0c0ae2e5c706118/81501/GD-to-auth.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Organizations and individuals find it more expensive to purchase and maintain a physical key than other software alternatives. </p>\n<p>Sometimes the authentication process is slower, which eventually hampers user experience, and thus users incline towards other alternatives that can offer multi-factor authentication.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Security keys are shaping the future of security and are pretty helpful in certain situations. Users can ensure the highest level of protection through this physical plug and play security keys anywhere, anytime. </p>\n<p>However, those that require excellent user experience coupled with robust security must consider relying on risk-based authentication (RBA) solutions designed to deliver exceptional user experience with stringent security mechanisms. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 23, 2021","updated_date":null,"description":"When it comes to robust security for a seamless authentication and authorization experience, security keys are considered one of the best ways to prove one’s identity. These security practices add an extra security layer other than passwords and ensure that the right person has access to the right information.","title":"What are Security Keys? What are its Advantages?","tags":["security keys","mfa","authentication","authorization"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5873015873015872,"src":"/static/98e6873caa25d2ae2a23903784aeac25/14b42/what-are-security-keys-cover.jpg","srcSet":"/static/98e6873caa25d2ae2a23903784aeac25/f836f/what-are-security-keys-cover.jpg 200w,\n/static/98e6873caa25d2ae2a23903784aeac25/2244e/what-are-security-keys-cover.jpg 400w,\n/static/98e6873caa25d2ae2a23903784aeac25/14b42/what-are-security-keys-cover.jpg 800w,\n/static/98e6873caa25d2ae2a23903784aeac25/16310/what-are-security-keys-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":378,"currentPage":64,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}