{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction With mobile threats evolving rapidly, securing access to personal and business data isn’t just important—it’s critical…","fields":{"slug":"/identity/mobile-authentication/"},"frontmatter":{"title":"Mobile Authentication: Everything You Need to Know","tags":["”Identity Management”","”User Authentication”","“CIAM Security”","“Authentication”"]}}},{"node":{"excerpt":"Every developer knows the feeling: you're in the zone, solving problems and bringing your vision to life, when suddenly you hit a wall. You…","fields":{"slug":"/identity/revamped-loginradius-docs-with-developer-first-experience/"},"frontmatter":{"title":"Code Less, Build More: Unveiling LoginRadius' AI-Powered Developer Documentation","tags":[]}}},{"node":{"excerpt":"Introduction With increasing cyber threats, traditional authentication methods like passwords and one-time passwords (OTPs) are no longer…","fields":{"slug":"/identity/push-notification-authentication/"},"frontmatter":{"title":"What is Push Notification Authentication and How It Works?","tags":["Identity Management","User Authentication","CIAM Security","Authentication"]}}},{"node":{"excerpt":"Introduction Cybersecurity threats are evolving, making it crucial for businesses and individuals to strengthen authentication security. One…","fields":{"slug":"/identity/types-of-mfa/"},"frontmatter":{"title":"Types of Multi Factor Authentication & How to Pick the Best","tags":["Identity Management","User Authentication","CIAM Security"]}}}]}}}