Industry blog

Posted: 17 Aug 2018
jmacinnis's picture

California Governor Jerry Brown signed into law the California Consumer Privacy Act (CCPA) of 2018 on June 28, 2018. The law pertains to businesses that collect personally identifiable information (PII) in the State of California. Businesses found violating CCPA including security breaches, may be charged with statutory damages as well...

Posted: 08 Aug 2018
amallet's picture

Fed by science fiction best-sellers and urban legend, Artificial Intelligence (A.I.) has been one of the hottest topics of the last 5 years. Now the identity solution market is starting to explore its potential to sort, analyse and process the overload of data and information that governments must handle. Cutting through the myths, I provide a view...

Posted: 17 Jul 2018
gmimick's picture

Today, banks and credit unions are challenged to outperform their competitors in the services they provide customers. Financial Institutions need to look to the future and transform the manner in which they deliver products and services that will help them retain their customers and attract new ones.

They’re also confronted by security threats and continuously having to keep up with new...

Posted: 25 Jun 2018
Vincent Gourmelen's picture

At a time of strong data encryption, on-chip biometry checks, digital signatures or national public key directories (N-PKD), one can question the necessity of adding advanced physical security features to a passport or an Identity card.

Counterfeited IDs Are a Concern

Even the most secure electronic ID documents are still subject to counterfeiting, particularly...

Posted: 31 May 2018's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Posted: 23 May 2018
harrehed's picture

As the General Data Protection Regulation (GDPR) takes affect this week (May 25), we reflect on how mobile access customers, who enable users to use their phones as a “key” to unlock doors, have been adapting and becoming compliant-ready for months.  User data is, of course, utilized in cloud services-based mobile access to connect individuals’ phones (and their identities) to the back-end of...

Posted: 16 Apr 2018
kwalker's picture

It has been clear for years that passwords alone are not enough to protect your company’s assets, networks, applications and data.  In fact, Verizon did an analysis in 2017 that determined 81% of data breaches globally involved the misuse or stolen or weak passwords.  With the number of breaches increasing every year, and the cost and consequences of those breaches also on the rise, the time...

Posted: 15 Apr 2018
fdickson's picture

The use of the password as an instrument of authentication has outlived its usefulness. The era of the password has passed. How did IDC come to this conclusion? It is simple really.

IDC would point to common "best practice: password hygiene.” Common password hygiene generally entails the following:

  1. Use a...
Posted: 26 Mar 2018
othiriondebriel's picture

The multi-factor authentication market is experiencing new dynamics. For the last 15 years, strong authentication was not a top of mind concern for organizations and was mainly based on hardware tokens generating one-time passwords (OTPs), a temporary 6 or 8 digit password. The user was required to first generate an OTP on his token and then copy/paste it into his online portal. It has been...