Industry blog

Posted: 08 Aug 2018
amallet's picture

Fed by science fiction best-sellers and urban legend, Artificial Intelligence (A.I.) has been one of the hottest topics of the last 5 years. Now the identity solution market is starting to explore its potential to sort, analyse and process the overload of data and information that governments must handle. Cutting through the myths, I provide a view on its potential applications in government...

Posted: 17 Jul 2018
gmimick's picture

Today, banks and credit unions are challenged to outperform their competitors in the services they provide customers. Financial Institutions need to look to the future and transform the manner in which they deliver products and services that will help them retain their customers and attract new ones.

They’re also confronted by security threats and continuously having to keep up with new...

Posted: 25 Jun 2018
Vincent Gourmelen's picture

At a time of strong data encryption, on-chip biometry checks, digital signatures or national public key directories (N-PKD), one can question the necessity of adding advanced physical security features to a passport or an Identity card.

Counterfeited IDs Are a Concern

Even the most secure electronic ID documents are still subject to counterfeiting, particularly...

Posted: 31 May 2018
ymassard@hidglobal.com's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Posted: 23 May 2018
harrehed's picture

As the General Data Protection Regulation (GDPR) takes affect this week (May 25), we reflect on how mobile access customers, who enable users to use their phones as a “key” to unlock doors, have been adapting and becoming compliant-ready for months.  User data is, of course, utilized in cloud services-based mobile access to connect individuals’ phones (and their identities) to the back-end of...

Posted: 16 Apr 2018
kwalker's picture

It has been clear for years that passwords alone are not enough to protect your company’s assets, networks, applications and data.  In fact, Verizon did an analysis in 2017 that determined 81% of data breaches globally involved the misuse or stolen or weak passwords.  With the number of breaches increasing every year, and the cost and consequences of those breaches also on the rise, the time...

Posted: 15 Apr 2018
fdickson's picture

The use of the password as an instrument of authentication has outlived its usefulness. The era of the password has passed. How did IDC come to this conclusion? It is simple really.

IDC would point to common "best practice: password hygiene.” Common password hygiene generally entails the following:

  1. Use a...
Posted: 26 Mar 2018
othiriondebriel's picture

The multi-factor authentication market is experiencing new dynamics. For the last 15 years, strong authentication was not a top of mind concern for organizations and was mainly based on hardware tokens generating one-time passwords (OTPs), a temporary 6 or 8 digit password. The user was required to first generate an OTP on his token and then copy/paste it into his online portal. It has been...

Posted: 21 Mar 2018
ymassard@hidglobal.com's picture

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Posted: 20 Mar 2018
mrobinton's picture

With thousands of people pouring into and out of high-rise office buildings each day, there is a growing demand to not only ensure the safety and security of each person, but to also create more connected experiences for people interacting with buildings.   Technologies are emerging to expand how building occupants and tenants engage, interact and work in new intelligent workspaces. In...

Pages