Industry blog

Posted: 14 Nov 2017

A few months back, I wrote a blog about the top reasons Colleges and Universities are making progress towards moving to Smart Cards as a secure means of safeguarding people, data and assets. Here’s the link to that conversation to help remind you about the points I made in that blog.  In...

Posted: 06 Nov 2017

The term ‘smart building’ has been floating around for quite some time now. The primary driver for smart buildings’ adoption in recent years has been energy cost savings. In the United States, commercial buildings account for 40% of total energy consumption; 38% of CO2 emissions and 71% of electricity consumptions[1]. Smart buildings...

Posted: 31 Oct 2017

On October 16th 2017, the NIST National Vulnerability Database added entry CVE-2017-15361 describing a bug in an Infineon RSA library used in many Trusted Platform Modules and smart cards currently in use. This vulnerability would possibly allow discovery of private RSA keys, even without possession of your smart card or TPM.  From...

Posted: 13 Oct 2017

In 2016 almost 1.1 billion identities were stolen globally.  This number is up dramatically from a reported 563.8 million identities stolen in 2015.   In addition, the same Symantec Internet Security Threat Report placed the United States at the top of the list for both the number of breaches by country (1,023) and the number of identities stolen by country.

New York State’s Division of...

Posted: 04 Oct 2017

You may have heard about the recent set of attacks on Bluetooth-enabled products, codenamed “BlueBorne,” which enables hackers to gain control over smart devices based on Android, iOS, Windows, Linux and other platforms without any action from the user.  Users of HID technology have asked how this cyber attack could potentially affect HID products. The good news is that the exposure for HID...

Posted: 28 Sep 2017

Nations around the world must secure the identities of their citizens, visitors and legal residents while improving how they access government applications and services.  I recently shared my thoughts on these challenges during an interview this past June at Security Document World 2017 and described how today’s advanced identity solutions are increasing the security, utility and value of...

Posted: 14 Sep 2017

With PIV and CAC credentials, US federal agencies and military bases have issued the most powerful ID credential for their employees and contractors.  PIV/CAC credentials provide a secure, standardized identification that can be trusted across US government organizations thanks to the use of US Federal Bridge Certificate Authority.  PIV/CAC credentials are used to login to computer, network...

Posted: 08 Sep 2017

You have likely read about the recent Equifax hack, where hackers accessed personal information of 143 million consumers.  You need to be concerned because the type of information that could have been accessed can be used to commit fraud and identity theft.  If you haven’t already, it’s time to take some steps to protect yourself and lock down your information.  Here are some specific steps...

Posted: 05 Sep 2017

There are many applications for identification and sensing technologies that are driving a connected oil, gas and refinement ecosystem. Organizations in the industry are experiencing success to help automate processes, improve visibility across the operation, and minimize operational risk by embracing the Internet of Things (IoT). From operating an oil rig to tracking thousands of assets...

Posted: 31 Aug 2017

Government agencies can realize several benefits from implementing a mobile ID. These are widely varied, depending upon the use case, but at a minimum, the government agency issuing credentials would greatly reduce its costs in implementing and maintaining complex infrastructures to assign, revoke or change someone’s credential. Further, governments could greatly reduce their risk and the...

Pages