Industry blog

Posted: 17 Jun 2019
fjogandcoulomb's picture

Today, a small number of citizens around the world are lucky enough to use digital IDs thanks to a handful of governments that have put these programs in place. For many others, digital ID is just around the corner. Nevertheless, the decision to go for a digital ID program implicates many decisions that a government must make during the process. An example of one such vital decision is where...

Continue reading >>
Posted: 06 Jun 2019
jcarpenter's picture

The simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, and malicious actors mean that digital security must evolve to stay one step ahead of security threats.

Strong, reliable security in a modern government, non-profit, SMB, or enterprise environment isn’t just important today; it's...

Continue reading >>
Posted: 22 May 2019
ilowe's picture

What is it?

Wikipedia defines Augmented Reality (AR) as, “an interactive experience of a real-world environment where the objects that reside in the real-world are ‘augmented’ by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory, and olfactory.”

More simply put, AR technology superimposes a...

Continue reading >>
Posted: 28 May 2019
mchandarana's picture

Business Email Compromise (BEC) is a type of phishing attack in which an attacker impersonates a high-level executive and attempts to trick an employee or customer into transferring money or sensitive data. According to the Federal Bureau of Investigation (FBI), as of 2018 this scheme has already caused $12.5 Billion in losses to companies. The FBI warned that there was a 60% increase in 2018...

Continue reading >>
Posted: 03 Jun 2019
jcarpenter's picture

What’s Keeping Healthcare Industry Executives and Stakeholders up at Night?

At the recent HealthCare Executive Group’s 30th Annual meeting, more than 100 executives from payer, provider and technology partner organizations ranked the top 10...

Continue reading >>
Posted: 16 May 2019
aletan's picture

As he waits to travel outside the EU, a man stands in the border control line to get his passport checked. He is a bit nervous, but his passport does not take any longer to get checked than the passport of the traveller before him. The border control officer takes a quick look at the security features on the polycarbonate data page and the security thread, the data is read from the MRZ and we’...

Continue reading >>
Posted: 15 May 2019
jmacinnis's picture

The oil and gas and critical infrastructure industries were the #1 targets by nation-state sponsored cyberthreat actors in 2017-18. Cyberattacks pose a significant threat causing major business disruption, downtime and loss of intellectual property. Rapid digitization of production tools across the industry can also increase the threat landscape unless properly mitigated.

...

Continue reading >>
Posted: 08 May 2019
bdegonia's picture

Every day law enforcement, border control and other agencies use official documents to confirm a person’s identity. But what happens when the person they encounter doesn’t possess an acceptable document, or when the document they do have doesn’t appear to be genuine? In today’s world, it’s increasingly important to know the real identity of a person to determine if they are a threat.

... Continue reading >>
Posted: 15 Apr 2019
ymassard@hidglobal.com's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 12 Apr 2019
rmegonigal's picture

When employing biometrics, there is a balance between privacy and security. Government entities are entrusted with keeping their citizens safe from both external and internal threats and biometrics are a useful tool to meet this expectation. However, there is a risk that corrupt governments can use biometrics to monitor citizens on issues not directly related to security, thus violating their...

Continue reading >>

Pages