icon

Hideez Blog | Identity Management News, Best practices & Tips

Hideez Assists FIDO Alliance in Launching the New Metadata Specification (MDS3)

FIDO MDS3
With the demise of password-based security and a growing diversity of authenticators over the last few years, a new streamlined repository to add and view FIDO Certified authenticators has long been needed. And here comes the Metadata Service version 3! The service was upgraded by the FIDO Alliance in collaboration with Hideez Group and introduced this week as a replacement to the deprecated MDS2.

SAML Basics: What is SAML And How Does It Work?

<b>SAML Basics: What is SAML And How Does It Work?</b>
SAML authentication is a widely used method that makes all of our lives easier. But, most online users don’t know how SAML works or what it even is, for that matter. There are many terms you can use to describe the features and capabilities of SAML for authentication purposes. On this page, we’ll run you through all of the SAML basics and help you understand this open standard the majority of people use daily.

How to Secure your Gmail Account in 2022? - Email Security Best Practices

<b> How to Secure your Gmail Account in 2022? - Email Security Best Practices</b>

Gmail is one of the most popular and yet most vulnerable email services. Backed by the largest search engine in the world and with over 1 billion email users and a corresponding amount of payment and confidential information, it attracts many scammers. It inspired us at Hideez to investigate the topic and provide tips on how to secure your Gmail account in 2022.

What Is Single-Factor Authentication? SFA Pros and Cons

What Is Single-Factor Authentication? SFA pros and cons
Single-factor authentication (SFA) was the norm for many years before multi-factor authentication started gradually replacing it. In today’s era of highly developed information systems, most security experts agree that single-factor authentication simply isn’t enough to keep you safe.

NIST Password Guidelines 2021. Password Policy Best Practices

NIST Password Guidelines | Password Policy Best Practices

Since 2014, the National Institute of Standards and Technology has issued guidelines, recommendations, and controls for identity authentication, including optimal password policy practices. The NIST password guidelines cover crucial practices for creating and managing passwords and requirements for the validation of these passwords

What is a Bluetooth Dongle and How to Choose the Best One?

What is a Bluetooth Dongle and How to Choose the Best One?

Adding a Bluetooth dongle to PC or Mac devices seems like a reasonably straightforward process. However, a lot of things can go wrong, not to your fault. On this page, we won’t try to convince you why you need a Bluetooth dongle, but we will share tips on how you can add it to your computer. We’ll even help you choose the right Bluetooth dongle based on your personal needs.

What is a Hardware Token? Hard Tokens vs. Soft Tokens

Hardware tokens Explained by Hideez
Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisticated authentication methods for ensuring enhanced user security. The most notable examples are hardware tokens, dedicated portable devices that authenticate the user’s identity and prevent unauthorized access.

CPRA explained. What does it mean for Businesses?

<b>CPRA explained. What does it mean for Businesses?</b>
The CCPA, California Consumer Privacy Act, has been legally enforceable since July 1st of last year. It is the first significant privacy law in the US pertaining to consumer control of personal data. And, even though it hasn’t even been a year since the official legal enforcement of the CCPA started, Californians have already voted for the follow-up act, called the California Privacy Rights Act (CPRA).

[Webinar] Revolution in authentication Fast Identity Online. Technology that will change the world

Вебинар стандарт fido беспарольная аутентификация
Webinar on passwordless authentication and its implementation in the business environment. Discussion topics:🔺Will the FIDO standard replace passwords? 🔺The magic of FIDO passwordless authentication. 🔺 Case studies of Fast Identity🔺Questions and answers

Wireless Electronic Signature “Almaz-1K”: convenience and safety in your pocket

Wireless Electronic Signature “Almaz-1K”: convenience and safety in your pocket
Hideez Group, together with the Institute of Information Technologies JSC, presented a new tool for secure data storage - the Almaz-1K electronic key, which supports Bluetooth wireless technology.

Save Time To Save Lives. Security Tools for Healthcare in the Time of Crisis

Save Time To Save Lives. Security Tools for Healthcare in the Time of Crisis
Doctors and nurses are leading the fight for human lives amidst the coronavirus outbreak. Once again, they rise to the challenge, providing help for those in need, and giving hope to others. What they need right now is time. Time to treat current patients and time to get ready for the new ones.

Secure Remote Work during a Pandemic. Best Authentication Tips

Secure Remote Work during a Pandemic. Best Authentication Tips
There’s a dramatic increase in phishing and other breach attempts as cybercriminals are increasingly seeking to profit off the coronavirus panic. How do you protect your organization from such attacks? Read more: