The Digital Pioneers Conference – Digitisation on the rise – 5 wonderful years of cidaas
Inspired by Star Trek: “Identity – infinite vastness. It’s the year 2020”, the Digital Pioneers talk about 5 years of cidaas
Inspired by Star Trek: “Identity – infinite vastness. It’s the year 2020”, the Digital Pioneers talk about 5 years of cidaas
Using TouchID or FaceID to unlock the smartphone is the current standard. In addition to security, it is above all a question of convenience for users to unlock their smartphone quickly and easily using a biometric procedure. This was not possible in the browser of the iPhone so far. With the new major version of the Apple browser Safari 14, Apple supports biometric authentication using TouchID and FaceID (Device Biometrics) via the FIDO2 and WebAuthn standards, respectively.
Now, FIDO2 is set as standard in Apple Browser Read More »
We joined the Alliance for Cyber Security as a member in mid-July and then completed our onboarding as a partner at the end of August. We would like to use this short blog to describe our first experiences with the Alliance for Cyber Security and our partner contributions.
Experience with the Alliance for Cyber Security Read More »
Ever since we launched cidaas a few years ago, we have been developing technology, in terms of organization and processes. And we are constantly working to incorporate the vast experience we gain every day and to implement new ideas.
Why Happiness Team? – The cidaas support Read More »
With Compromised Credentials Detection, users are informed about stolen or already cracked passwords to protect them even better. Let us first reveal why Compromised Credentials Detection is necessary and how digital platforms can be made even more secure.
Detect Compromised Credentials – Goodbye password Read More »
In the past, we relied only on passwords to secure our digital lives. Now, they are the major drawback
World-wide 4 out of 5 data breaches arise from weak or stolen passwords Read More »
cidaas is a modern, European cloud identity and access management system that ensures security and GDPR compliance through its features.
Identity theft is one of the most common cybercrimes. In order to counter hacker attacks, it is important to first know the types of attack.
Identity theft: The 3 most common hacker attacks Read More »
Social Logins, Device Biometrics, Single-Sign-on – Comfortable access is essential for users in order to use an app smoothly and repeatedly.
Modern login in Flutter: Social Login, Single-Sign-On and Device Biometrics Read More »
Securing digital identities through easy Login with the help of biometric methods from cidaas e.g. TouchID, fingerprint, face recognition (FaceID) etc
Digital identity “for breakfast” at the Digital Breakfast Read More »