icon

Hideez Blog | Identity Management News, Best practices & Tips

What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages

<b>What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages</b>
  Logging into a website or service using the traditional username and password combination isn’t the best or safest way of going about it anym...

Next-Gen Smart Card Authentication: How Does FIDO Authentication Enhance Traditional Smartcard Logins?

next-gen smartcard login
  In today's rapidly evolving digital landscape, the protection of sensitive information has become increasingly crucial. As traditional authen...

Mobile Authentication and App Authenticators: The Future of Passwordless Identity Management

What is app authenticator?
  In today's digital world, securing sensitive information and protecting user privacy is of utmost importance. Cybersecurity threats are const...

From passwords to passwordless: Apple adopts a new authentication technology

Apple adopts passwordless technology
  Apple has finally introduced its new passkeys technology in a move to foster the development of passwordless authentication. With passkeys in iC...

What is a Hardware Token? Hard Tokens vs. Soft Tokens

Hardware tokens Explained by Hideez
  Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisti...

Forget Your Password. Ultimate Guide to Passwordless Future

Forget Your Password. Ultimate Guide to Passwordless Future
People have an ancient-long history of using passwords. Let's recap the development of passwords and authentication technologies (2FA, MFA, OTP, U2F, FIDO2). Get the Manual on how to become passwordless in 2020.

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. As passwordless authentication is quickly becoming a popular method of securing valuable information, it only remains to be seen how ubiquitous can it grow in 2020 and the years to come. Continue reading to find out everything there is to know about this authentication solution.

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users.