Industry blog

Posted: 21 Sep 2020
jmilan's picture

Back in 2015, HID Global was one of the first advocates of mobile identity for government-issued documents. When we started to promote that idea, few could imagine that one day there would be legally enforceable documents issued on a mobile phone. It’s been a long and sometimes slow journey, but now in 2020, not only have we proudly launched the...

Continue reading >>
Posted: 17 Sep 2020
abull's picture

Physical identity and access management (PIAM) is key to securing your bank premises, sensitive locations and financial data. When choosing a PIAM platform, check that it will cover all of your banking security needs. This blog post contains some questions you can ask to ensure you choose a...

Continue reading >>
Posted: 07 Sep 2020
msugdon's picture

An integrated approach to the design of security documents is one of the fundamental building blocks on which secure identity documents are created. Design should be a circular process that evolves and iterates to accommodate the document’s many features and manufacturing processes, with manufacturers and designers working together every step of the way. To be effective, this integrated...

Continue reading >>
Posted: 27 Aug 2020
jandler's picture

Hospitals are seeing a surge in patients and a loss of revenue. By streamlining processes like visitor management and onboarding contractors and employees, hospitals can focus on securing their facilities, mitigating risks and delivering revenue-driving procedures.

...

Continue reading >>
Posted: 26 Aug 2020
jhinmon's picture

Today’s Chief Information Security Officers (CISOs) face many challenges, with the estimated cost of breaches, identity theft and cybercrime expected to double from $3 trillion in 2015 to $6 trillion in 2021. Credential theft is linked to...

Continue reading >>
Posted: 17 Aug 2020
bdegonia's picture

If you read our blog series, True Crime Stories, you learned how murders that went unsolved for years were cleared thanks to biometric data that could finally be compared to an entire database of biometrics. In short, catching the bad guys has become easier than ever. Thanks for...

Continue reading >>
Posted: 11 Aug 2020
jandler's picture

Effective visitor management is essential at any medical facility, but perhaps never more so than at children's hospitals and pediatric specialists. The right type of hospital visitor system can contribute towards care, giving children and their families the time, safety...

Continue reading >>
Posted: 04 Aug 2020
mchandarana's picture

It shouldn’t come as a surprise that we are talking about TLS/SSL digital certificate lifespan again; after all, the industry has been mandating a shorter lifespan for TLS/SSL certificates for the past few years. It is good...

Continue reading >>
Posted: 03 Aug 2020
fjacquot's picture

The passport is a rather peculiar identity document — unlike most other documents, it is issued by one country and checked in another country. A passport’s sole purpose is to prove that a person is who he or she claims to be, making this identity document and the information stored in it important to a country’s national security.

...

Continue reading >>
Posted: 23 Jul 2020
ilowe's picture

Simple, secure, seamless: it’s what every security professional wants in a physical identity and access management (PIAM) solution, but wanting is a far cry from reality. PIAM relies on collecting, analyzing, using, and reporting on security information in a centralized way. Whether you’re seasoned in the practice or just considering it, here are the five most important questions to ask of...

Continue reading >>

Pages