Industry blog

Posted: 25 Jan 2019
othiriondebriel's picture

With the sophistication of hacking attacks, it becomes more and more difficult for banks to guarantee their customers' data will not be compromised. In October 2018, an undisclosed number of HSBC’s online retail accounts in the US were hacked. The technique used by the hackers is called “credential stuffing,” which means personal details were harvested from elsewhere, and then utilized to gain...

Posted: 18 Dec 2018
amalpani's picture

Today’s work places are built upon a web of disparate systems—physical access to doors and locks, access to IT and printer networks, meeting room management, food and beverage vending—that employees, visitors and vendors continually interact with, experiencing varying degrees of satisfaction. But when these systems are made identity aware to tap into a common understanding of who you are and...

Posted: 27 Nov 2018
vgourmelen's picture

Window in a PC document: A new trend that is here to stay

The first polycarbonate identity document with a window was launched into the market in 2007. Over the last decade, windows in polycarbonate documents have become progressively one of the most demanded security features alongside rainbow printing, OVI or CLI/MLI.

Maximize a level 1 security feature...

Posted: 19 Nov 2018
othiriondebriel's picture

On 27th October, Karachi-based BankIslami became the target of one of the most devastating cyber-attack in Pakistan. It admitted a security breach of its payment cards system but denied having lost an alleged amount of $6 million. Many reports state that the attack consisted of several suspicious Point of Sales transactions made at Target stores in Brazil and in the U.S. To restrain the...

Posted: 13 Nov 2018
aletan's picture

The recent anniversary of September 11th reminds us that terrorist attacks and threats have risen across the world. Consequently, governments and local and international authorities have invested more resources to secure their borders and their ID documents with the objective of:

  • Controlling the entry and exit of people across borders,...
Posted: 05 Nov 2018
jnippoldt's picture

When was the last time you cleaned your ID card printer? Did you know that overlooking this simple and low cost routine maintenance item could be costing your organization money, time and unnecessary aggravation?

Read on to learn more about why it is essential to routinely clean your ID card printer.

Why clean?

Whether you realize it or not, ID card...

Posted: 02 Nov 2018
othiriondebriel's picture

A large percentage of our lives is now conducted digitally (both on a personal level and at work), and this is set to continue with our demand for speed and convenience. This means there are billions of digital identities stored in many different systems with varying degrees of security, and cybercriminals are devising more sophisticated methods to leverage any weakness.

In a...

Posted: 15 Oct 2018
jmacinnis's picture

PKI certificate technology has long been a foundational technology in securing web traffic between users and web services. PKI (public key infrastructure) defines the method that a web browser uses to determine that a website is genuine and belongs to the correct business or organization. In other words, PKI certificates are used to ensure the identity of a remote computer/server.  Most...

Posted: 12 Oct 2018
CSandness's picture

At HID Global, we take pride in powering the trusted identities of the world’s people, places, and things. While providing this trust in the products and solutions in our portfolio through processes such as “mutual authentication”, it is equally important to highlight the mutual trust between HID and our worldwide partners. While multiple products may validate one another to establish security...