Industry blog

Posted: 26 Nov 2019
jcarpenter's picture

Most IT and cybersecurity professionals have at least occasional anxiety about when the next major virus, ransomware or swarm bot will hit. With the bulk of data breaches occurring at the network perimeter—as users get their emails and go online—user authentication software is a primary concern.

The fight against stolen credentials has led to the growing adoption of two-factor...

Continue reading >>
Posted: 20 Nov 2019
jmacinnis's picture

While we enjoy the business opportunities, productivity gains and user conveniences of our data-driven economy, we certainly do not enjoy the cost and devastation of having accounts hacked, clients’ data stolen or employees’ identities misused.

In the quest for data integrity and secure credential management, public-key infrastructure (PKI) has long proven its effectiveness as a key...

Continue reading >>
Posted: 14 Nov 2019
ymassard@hidglobal.com's picture

State governments, municipalities and other local agencies can sometimes struggle with authenticating their citizens, particularly in an increasingly mobile world. Effective identity and access management is vital to protecting sensitive data but must be balanced against the...

Continue reading >>
Posted: 08 Nov 2019
othiriondebriel's picture

Business, customer and account security are critical for banks and other financial organizations. Banks are continually re-evaluating how they provide robust protection across all of their technology, and there’s been a recent shift in the approach. The ongoing move to cloud-based technologies means that banks are increasingly looking for Software as a Service (SaaS) solutions, and secure apps...

Continue reading >>
Posted: 29 Oct 2019
jmacinnis's picture

As a collaborative effort between the government and the cybersecurity industry, National Cybersecurity Awareness Month (NCSAM) is held every October. The educational month helps raise awareness of how businesses and individuals can protect themselves online. With criminals, hackers, and other bad actors continually developing how they attack and gain access to systems and data, we must...

Continue reading >>
Posted: 24 Oct 2019
ilowe's picture

We’re delighted to announce that HID® SAFE™, our enterprise-class physical identity and access management (IAM) system, is now certified to the rigorous ISO 27001 international security standard. The family of 27000 ISO standards is designed to ensure organizations can protect and manage the security of vital assets, including:

  • Financial information and accounts
  • ...
Continue reading >>
Posted: 23 Oct 2019
jmacinnis's picture

Whether it’s in whitepapers, news stories, sell sheets, or on display at trade shows, industry jargon around authentication is practically inescapable. In today’s threat landscape, there’s certainly justification for keeping these topics front-of-mind and sparking conversation.

But when authentication concepts start to get a little tangled, it can be hard to know if you’re speaking the...

Continue reading >>
Posted: 03 Oct 2019
fjacquot's picture

Passport technology is changing from the paper of the past. In the last 15 years, more than 150 countries have moved to a highly secure electronic passport that uses an inlay to support a microcontroller chip. Still, the strongest trend in passports is a polycarbonate (PC) datapage. As of today, more than 40 countries have upgraded their travel documents from the standard paper-and-laminate...

Continue reading >>
Posted: 03 Oct 2019
jcarpenter's picture

Today’s fast-changing digital environment is throwing identity and authentication challenges at us from every direction. Remote workforces, mobile apps, the Internet of Things (IoT) and increasingly complex data theft schemes just keep upping cybersecurity risks in every type of organization.

...

Continue reading >>
Posted: 24 Sep 2019
ilowe's picture

Part of the FAA’s mission is to make sure that airports comply with security standards to keep employees, passengers, and others safe when they are on the ground and in the air, but managing compliance with FAA rules and airport security policy can be complicated. Ensuring that airport employees, temporary contractors and other personnel get to work quickly and easily requires a balance of...

Continue reading >>

Pages