icon

Hideez Blog | Identity Management News, Best practices & Tips

From passwords to passwordless: Apple adopts a new authentication technology

Apple adopts passwordless technology
  Apple has finally introduced its new passkeys technology in a move to foster the development of passwordless authentication. With passkeys in iC...

What is a Hardware Token? Hard Tokens vs. Soft Tokens

Hardware tokens Explained by Hideez
  Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisti...

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users. 

What is Identity Management? Enterprise Identity Management Solutions

What is Identity Management? Enterprise Identity Management Solutions
  Cybersecurity has come a long way in the past two decades. So much so that proper identity management practices have become a basis for stron...

The Evolution of Security Wearables

The Evolution of Security Wearables
Several hundred thousand years ago, early humans learned to carry sticks around to protect itself and its family from predators and rivals. Later,...

How to Use Hideez Key's RFID Module

How to Use Hideez Key's RFID Module
Hideez Key can serve as an electronic key for home, office or gym. Using the RFID features does not require any additional software. Hideez Key is equipped with RFID module that works on the 125 kHz frequency bandwidth. The RFID antenna with the control unit can be found under the top cover.