{"data":{"allMarkdownRemark":{"group":[{"tag":"2FA","totalCount":2},{"tag":"2fa","totalCount":3},{"tag":"2fa bypass","totalCount":1},{"tag":"ABAC","totalCount":1},{"tag":"AI","totalCount":1},{"tag":"API","totalCount":2},{"tag":"Authentication","totalCount":1},{"tag":"CIAM Innovation","totalCount":1},{"tag":"CIAM Security","totalCount":3},{"tag":"Cybersecurity","totalCount":1},{"tag":"Developer tools","totalCount":1},{"tag":"Engineering","totalCount":1},{"tag":"Identity Management","totalCount":4},{"tag":"Identity management","totalCount":1},{"tag":"LoginRadius","totalCount":6},{"tag":"MFA","totalCount":7},{"tag":"OTP","totalCount":1},{"tag":"Okta","totalCount":1},{"tag":"Oktapus","totalCount":1},{"tag":"Phishing","totalCount":1},{"tag":"Privileged Access Management","totalCount":1},{"tag":"RBAC","totalCount":1},{"tag":"SCIM","totalCount":1},{"tag":"SSO","totalCount":1},{"tag":"Security","totalCount":1},{"tag":"User Authentication","totalCount":4},{"tag":"access control","totalCount":1},{"tag":"access management","totalCount":1},{"tag":"account fraud","totalCount":1},{"tag":"adaptive authentication","totalCount":1},{"tag":"adaptive mfa","totalCount":1},{"tag":"ai","totalCount":2},{"tag":"all, Security","totalCount":2},{"tag":"apple","totalCount":1},{"tag":"artificial intelligence","totalCount":3},{"tag":"attack vector","totalCount":1},{"tag":"authentication","totalCount":46},{"tag":"authentication process","totalCount":1},{"tag":"authorization","totalCount":7},{"tag":"b2b","totalCount":3},{"tag":"benefits of mfa","totalCount":1},{"tag":"biometric authentication","totalCount":9},{"tag":"botnet","totalCount":1},{"tag":"broken authentication","totalCount":2},{"tag":"ccpa","totalCount":1},{"tag":"centralized access management","totalCount":1},{"tag":"ciam","totalCount":14},{"tag":"ciam authentication","totalCount":1},{"tag":"ciam integration​","totalCount":1},{"tag":"ciam management​","totalCount":1},{"tag":"ciam platform","totalCount":5},{"tag":"ciam resilience","totalCount":1},{"tag":"ciam security​","totalCount":1},{"tag":"ciam solution","totalCount":49},{"tag":"ciam solutions","totalCount":15},{"tag":"ciam technology","totalCount":1},{"tag":"cloud computing","totalCount":6},{"tag":"cloud cost optimization\"","totalCount":1},{"tag":"cloud environment","totalCount":1},{"tag":"cloud governance","totalCount":1},{"tag":"cloud identity","totalCount":4},{"tag":"cloud identity management","totalCount":1},{"tag":"cloud migration","totalCount":1},{"tag":"cloud security","totalCount":8},{"tag":"compliance","totalCount":61},{"tag":"consent management","totalCount":3},{"tag":"consumer identity","totalCount":2},{"tag":"consumer-experience","totalCount":2},{"tag":"consumer-identity","totalCount":3},{"tag":"continuous authentication","totalCount":1},{"tag":"cookie management","totalCount":1},{"tag":"coverage","totalCount":1},{"tag":"cross device","totalCount":1},{"tag":"customer authentication","totalCount":2},{"tag":"customer data","totalCount":1},{"tag":"customer data security","totalCount":2},{"tag":"customer experience","totalCount":1},{"tag":"customer identity","totalCount":4},{"tag":"customer identity management","totalCount":6},{"tag":"customer success","totalCount":2},{"tag":"customer trust","totalCount":2},{"tag":"customer-experience","totalCount":8},{"tag":"cx","totalCount":176},{"tag":"cyberattack","totalCount":1},{"tag":"cyberattacks","totalCount":5},{"tag":"cybersecurity","totalCount":34},{"tag":"cybersecurity awareness","totalCount":1},{"tag":"cybersecurity campaign","totalCount":1},{"tag":"cybersecurity tips","totalCount":1},{"tag":"data collection","totalCount":1},{"tag":"data governance","totalCount":2},{"tag":"data leak","totalCount":1},{"tag":"data management","totalCount":1},{"tag":"data migration","totalCount":1},{"tag":"data privacy","totalCount":24},{"tag":"data protection","totalCount":2},{"tag":"data security","totalCount":101},{"tag":"digital identity","totalCount":7},{"tag":"digital identity management","totalCount":10},{"tag":"digital identity transformation","totalCount":1},{"tag":"digital revolution","totalCount":1},{"tag":"digital security","totalCount":1},{"tag":"digital transformation","totalCount":17},{"tag":"digital trust","totalCount":1},{"tag":"digital-identity","totalCount":3},{"tag":"digital-transformation","totalCount":1},{"tag":"direct to consumer","totalCount":1},{"tag":"disaster recovery","totalCount":1},{"tag":"dynamic authorization","totalCount":1},{"tag":"ecommerce","totalCount":2},{"tag":"ecommerce security","totalCount":1},{"tag":"enterprise security","totalCount":5},{"tag":"enterprises","totalCount":2},{"tag":"federated identity management","totalCount":3},{"tag":"federated sso","totalCount":2},{"tag":"govtech","totalCount":1},{"tag":"growth blogs","totalCount":1},{"tag":"healthcare","totalCount":1},{"tag":"iam","totalCount":2},{"tag":"idaas","totalCount":1},{"tag":"idaas provider","totalCount":1},{"tag":"identification","totalCount":1},{"tag":"identity access management","totalCount":2},{"tag":"identity and access management","totalCount":1},{"tag":"identity authentication","totalCount":1},{"tag":"identity blogs","totalCount":1},{"tag":"identity fabric","totalCount":1},{"tag":"identity governance","totalCount":5},{"tag":"identity import manager","totalCount":1},{"tag":"identity management","totalCount":40},{"tag":"identity modernization","totalCount":2},{"tag":"identity orchestration","totalCount":2},{"tag":"identity proofing","totalCount":1},{"tag":"identity provider","totalCount":2},{"tag":"identity security","totalCount":3},{"tag":"identity verification","totalCount":9},{"tag":"identity-governance","totalCount":1},{"tag":"identity-theft","totalCount":1},{"tag":"identity-trends","totalCount":3},{"tag":"identity-verification","totalCount":1},{"tag":"incident response","totalCount":1},{"tag":"industry news","totalCount":3},{"tag":"industry-news","totalCount":12},{"tag":"information security","totalCount":1},{"tag":"iot","totalCount":2},{"tag":"iot security","totalCount":1},{"tag":"leadership updates","totalCount":1},{"tag":"login","totalCount":2},{"tag":"login authentication","totalCount":2},{"tag":"login security","totalCount":3},{"tag":"media-and-publication","totalCount":9},{"tag":"mfa","totalCount":50},{"tag":"mfa fatigue","totalCount":1},{"tag":"mfa login","totalCount":1},{"tag":"mitre attack","totalCount":1},{"tag":"mobile biometric authentication","totalCount":1},{"tag":"modern customer identity","totalCount":1},{"tag":"multi cloud","totalCount":2},{"tag":"multi tenant","totalCount":1},{"tag":"multi-factor authentication","totalCount":1},{"tag":"new beginnings","totalCount":1},{"tag":"no code","totalCount":1},{"tag":"oauth","totalCount":2},{"tag":"omnichannel","totalCount":1},{"tag":"on prem","totalCount":1},{"tag":"online security","totalCount":2},{"tag":"online shopping","totalCount":2},{"tag":"other","totalCount":5},{"tag":"passive authentication","totalCount":1},{"tag":"passkeys","totalCount":2},{"tag":"password authentication","totalCount":1},{"tag":"password management","totalCount":11},{"tag":"password security","totalCount":1},{"tag":"passwordless","totalCount":2},{"tag":"passwordless authentication","totalCount":9},{"tag":"passwordless login","totalCount":15},{"tag":"phishing","totalCount":1},{"tag":"phishing attacks","totalCount":1},{"tag":"phone login","totalCount":1},{"tag":"pin authentication","totalCount":2},{"tag":"privacy-and-compliance","totalCount":1},{"tag":"progressive profiling","totalCount":8},{"tag":"public-sector","totalCount":8},{"tag":"rba","totalCount":1},{"tag":"reauthentication","totalCount":1},{"tag":"regulations","totalCount":1},{"tag":"resiliency","totalCount":1},{"tag":"retail","totalCount":1},{"tag":"risk based authentication","totalCount":4},{"tag":"risk management","totalCount":1},{"tag":"risk-based authentication","totalCount":2},{"tag":"robust security","totalCount":2},{"tag":"saas","totalCount":3},{"tag":"saml","totalCount":4},{"tag":"sase","totalCount":1},{"tag":"scalability","totalCount":1},{"tag":"security","totalCount":31},{"tag":"security keys","totalCount":1},{"tag":"security tips","totalCount":1},{"tag":"self sovereign id","totalCount":1},{"tag":"single sign on","totalCount":4},{"tag":"single sign-on","totalCount":4},{"tag":"single tenant","totalCount":1},{"tag":"smart cities","totalCount":1},{"tag":"smart credentials","totalCount":1},{"tag":"social authentication","totalCount":1},{"tag":"social login","totalCount":9},{"tag":"sso","totalCount":17},{"tag":"sso authentication","totalCount":1},{"tag":"sso provider","totalCount":2},{"tag":"surface attack","totalCount":1},{"tag":"token authentication","totalCount":2},{"tag":"travel-and-hospitality","totalCount":1},{"tag":"user access","totalCount":1},{"tag":"user authentication","totalCount":11},{"tag":"user experience","totalCount":3},{"tag":"user management","totalCount":6},{"tag":"user onboarding","totalCount":2},{"tag":"user provisioning","totalCount":2},{"tag":"ux","totalCount":3},{"tag":"web sso","totalCount":1},{"tag":"webhook","totalCount":1},{"tag":"workflow automation","totalCount":1},{"tag":"zero trust","totalCount":7},{"tag":"zero trust security","totalCount":4},{"tag":"zero-trust security","totalCount":2},{"tag":"“Authentication”","totalCount":1},{"tag":"“CIAM Security”","totalCount":1},{"tag":"”Identity Management”","totalCount":1},{"tag":"”User Authentication”","totalCount":1}]}}}