Industry blog

Posted: 25 Mar 2020
jcarpenter's picture

When you hear the word “espionage,” which spy movie comes to mind?

007? Jason Bourne? Mission Impossible? Unfortunately, corporate espionage isn’t just in the movies—it’s a real threat that has become an ever-evolving challenge to companies large and small. No matter the industry, if your company develops any form of new technology or intellectual property of interest to your...

Continue reading >>
Posted: 25 Mar 2020
lwoodson's picture

As we find ourselves learning to work in new ways where business as usual doesn’t apply, it is essential to identify opportunities that build connection, help us move from a threat to reward state, and live our values of empowerment, integrity and innovation.

...

Continue reading >>
Posted: 09 Mar 2020
ilowe's picture

How Our Customers are Using HID SAFE™ Visitor Management to Minimize Infection Risks

In an emergency, workplace preparation and clear communication are critical. We’ve compiled a list of essential best practices learned from customers, including ones in healthcare, that...

Continue reading >>
Posted: 06 Mar 2020
stilmann's picture

The follow article contains potentially disturbing references to child abduction and sexual assault.

“Any investigator has that one case they wished they’d finished, and this was mine. I just kept working on it. I wanted to get justice for that girl and her family.”

...

Continue reading >>
Posted: 04 Mar 2020
mchandarana's picture

There’s a new-ish acronym in town: BEC (business email compromise). BEC is what law enforcement agencies and analysts are now calling phishing that targets corporate structures and public entities, thanks to the rise in frequency and complexity of these scams. As network security hardens, bad actors have to find another way in. Too often, users are the weakest link in...

Continue reading >>
Posted: 28 Feb 2020
SWarne's picture

The age of convenience is here, and we all want to identify ourselves with mobile, digital or contactless technologies. While it is true that the drive for continually simpler ways to prove our identity will intensify, there needs to be a secure root identity which underpins the security of these new processes and technologies. Governments, issuing authorities, police and border forces all...

Continue reading >>
Posted: 27 Feb 2020
ymassard@hidglobal.com's picture

The fast-changing digital world, remote workforces and mobile apps of today’s complex IT environments require businesses to continually improve their security posture. As IT and cybersecurity professionals look to utilize strong user authentication technology, they seek the following requirements: easy deployment and management, flexibility to protect both on-premises and cloud-based...

Continue reading >>
Posted: 23 Feb 2020
rmegonigal's picture

When someone is murdered and the killer is never found, the family members of the victim have to live with terrible unanswered questions. It is this distress that motivates people who work in law enforcement to open cold case units. Sometimes advances in technology or further investigation can help solve cold violent crimes, which offers some peace and closure for those family members.

... Continue reading >>
Posted: 18 Feb 2020
SWarne's picture

Over the past year, many countries and border authorities have either installed automated passport control systems or implemented pilot projects to speed up the identity verification processes without compromising security. There is no doubt that this trend will continue to accelerate in 2020.

...

Continue reading >>
Posted: 10 Feb 2020
stilmann's picture

68-year-old Sondra Better was finishing her shift at Lu Shay’s Consignment Shop in Delray Beach Florida in August 1998 when a man came into the store and beat her to death. Sondra received several blows to the head before her throat was slashed and she was left on the floor to die.

Sondra was a mother, a grandmother and the cherished wife of her husband Seymour “Zeke” Better. The...

Continue reading >>

Pages