Industry blog

Posted: 13 Nov 2018
aletan's picture

The recent anniversary of September 11th reminds us that terrorist attacks and threats have risen across the world. Consequently, governments and local and international authorities have invested more resources to secure their borders and their ID documents with the objective of:

  • Controlling the entry and exit of people across borders, and
  • Protecting and authenticating...
Posted: 05 Nov 2018
jnippoldt's picture

When was the last time you cleaned your ID card printer? Did you know that overlooking this simple and low cost routine maintenance item could be costing your organization money, time and unnecessary aggravation!

Read on to learn more about why it is essential to routinely clean your ID card printer.

Why clean?

Whether you realize it or not, ID card...

Posted: 02 Nov 2018
othiriondebriel's picture

A large percentage of our lives is now conducted digitally (both on a personal level and at work), and this is set to continue with our demand for speed and convenience. This means there are billions of digital identities stored in many different systems with varying degrees of security, and cybercriminals are devising more sophisticated methods to leverage any weakness.

In a...

Posted: 15 Oct 2018
jmacinnis's picture

PKI certificate technology has long been a foundational technology in securing web traffic between users and web services. PKI (public key infrastructure) defines the method that a web browser uses to determine that a website is genuine and belongs to the correct business or organization. In other words, PKI certificates are used to ensure the identity of a remote computer/server.  Most...

Posted: 12 Oct 2018
CSandness's picture

At HID Global, we take pride in powering the trusted identities of the world’s people, places, and things. While providing this trust in the products and solutions in our portfolio through processes such as “mutual authentication”, it is equally important to highlight the mutual trust between HID and our worldwide partners. While multiple products may validate one another to establish security...

Posted: 25 Sep 2018's picture

Passwords are an annoyance for employees, a leading security risk for organizations and costly for IT to support. The IT industry has been on a quest to eliminate passwords for some time and earlier this year, Microsoft announced FIDO2 security keys for Windows Hello so...

Posted: 17 Aug 2018
jmacinnis's picture

California Governor Jerry Brown signed into law the California Consumer Privacy Act (CCPA) of 2018 on June 28, 2018. The law pertains to businesses that collect personally identifiable information (PII) in the State of California. Businesses found violating CCPA including security breaches, may be charged with statutory damages as well...

Posted: 08 Aug 2018
amallet's picture

Fed by science fiction best-sellers and urban legend, Artificial Intelligence (A.I.) has been one of the hottest topics of the last 5 years. Now the identity solution market is starting to explore its potential to sort, analyse and process the overload of data and information that governments must handle. Cutting through the myths, I provide a view...