icon

Hideez Blog | Identity Management News, Best practices & Tips

What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages

<b>What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages</b>
Logging into a website or service using the traditional username and password combination isn’t the best or safest way of going about it anymore. As cybercriminals become more technologically advanced, data protection methods must also move forward. This is where new authentication standards such as FIDO2 can become a useful tool in battling the issue.

What Is a Passkey and How Does It Work?

What is Passkeys and How Do They Work?
Passkeys offer an innovative approach, eliminating many of the vulnerabilities associated with passwords while enhancing user convenience. This shift marks a significant step forward in securing online accounts against modern attacks. In this article, we will explore what passkeys are, how they work, and why they're poised to revolutionize the way we access our online accounts.

What Is IDaaS? Ultimate Guide to Identity as a Service

<b>What Is IDaaS? Ultimate Guide to Identity as a Service</b>
With the increasing number of cyber threats and data breaches, traditional methods of managing identities and access controls are becoming obsolete. Companies need a more flexible and scalable approach to handle the growing complexity of their IT environments, especially since remote work becomes more prevalent.

From passwords to passwordless: Apple adopts a new authentication technology

Apple adopts passwordless technology
Apple has finally introduced its new passkeys technology in a move to foster the development of passwordless authentication. With passkeys in iCloud Keychain, macOS and iOS users will get the option to log in to their accounts with just a username and a Face ID or Touch ID scan, which is promised to be easier, faster, and much more secure than traditional password-based logins and MFA. 

Forget Your Password. Ultimate Guide to Passwordless Future

Forget Your Password. Ultimate Guide to Passwordless Future
People have an ancient-long history of using passwords. Let's recap the development of passwords and authentication technologies (2FA, MFA, OTP, U2F, FIDO2). Get the Manual on how to become passwordless in 2020.

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. 

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users.